Home | Amazing | Today | Tags | Publishers | Years | Search 
CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (MindTap Course List)
CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (MindTap Course List)

This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompTIA Security+ SY0-401 Certification Exam, providing thorough coverage of all domain objectives to help readers prepare for professional...

The Web Designer's Roadmap
The Web Designer's Roadmap

The Web Designer's Roadmap is a full-color book about the creative process and the underlying principles that govern that process.

While other books cover the nuts 'n' bolts of how to design the elements that make up websites, this book outlines how effective designers go about their work,...

New Programmers Start Here: An Introduction to Computer Programming Using JavaScript
New Programmers Start Here: An Introduction to Computer Programming Using JavaScript

New Programmers Start Here introduces students to the world of computer programming using JavaScript and related technologies. This book doesn't just teach the basics of programming, but also all of the tools that new programmers need to get started, including the basics of making web pages and how the Internet works. This book offers...

Windows 8 eLearning Kit For Dummies
Windows 8 eLearning Kit For Dummies

Use Windows 8 without worry with this complete learning kit

If you want to master Windows 8, this value-packed eLearning kit is essential to your learning process. A complete Microsoft Windows 8 course, it includes a full-color printed book and an interactive eLearning course on CD. Each lesson opens with an introduction to...

Mac OS X Lion Bible
Mac OS X Lion Bible

A comprehensive guide to all aspects of Mac's newest operating system, OS X Lion

The latest Mac operating system takes full advantage of the latest multi-touch trackpads, the new App Store for the desktop, and a host of upgrades that incorporate some of the best elements of the iPad experience. This book covers every new...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

HIV/AIDS-Associated Viral Oncogenesis (Cancer Treatment and Research)
HIV/AIDS-Associated Viral Oncogenesis (Cancer Treatment and Research)

One of the most important aspects of AIDS is the loss of protective immune function in the infected host which leads to increased prevalence of opportunistic infections and cancers. This book specifically addresses viral-induced human cancers associated with AIDS and observed in the AIDS population. It addresses the specific...

Tourism, Urbanization, and the Evolving Periphery of the European Union
Tourism, Urbanization, and the Evolving Periphery of the European Union
This book explores travel, tourism, and urban development at the edges of Europe from the 1970s until the present. It compares tourism-spurred urban growth in Spain and Bulgaria, showing how development in Southern Europe after the fall of dictatorships provided a model for integrating post-socialist Europe in the 1990s. It analyzes the...
Sorry I'm Late, I Didn't Want to Come: One Introvert's Year of Saying Yes
Sorry I'm Late, I Didn't Want to Come: One Introvert's Year of Saying Yes
An introvert spends a year trying to live like an extrovert with hilarious results and advice for readers along the way.

What would happen if a shy introvert lived like a gregarious extrovert for one year? If she knowingly and willingly put herself in perilous social situations that she’d normally avoid at all
...
Software Design for Resilient Computer Systems
Software Design for Resilient Computer Systems

This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features it should provide for highest reliability. With this second edition of Software Design for Resilient Computer Systems the book is thoroughly updated to contain the newest advice...

The Journalist's Guide to Media Law: A handbook for communicators in a digital world
The Journalist's Guide to Media Law: A handbook for communicators in a digital world
We are all journalists and publishers now: at the touch of a button we can send our words, sounds and images out to the world. No matter whether you're a traditional journalist, a blogger, a public relations practitioner or a social media editor, everything you publish or broadcast is subject to the law. But which law?

...
Rural Technology Development and Delivery: RuTAG and Its Synergy with Other Initiatives (Design Science and Innovation)
Rural Technology Development and Delivery: RuTAG and Its Synergy with Other Initiatives (Design Science and Innovation)

This book comprises the proceedings of a rural technologies conference organised by the Rural Technology Action Group (RuTAG), which was conceptualized and initiated by Principal Scientific Adviser (PSA) to the Government of India R. Chidambaram in 2003–04. The book highlights case studies and research into providing science...

Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy