Home | Amazing | Today | Tags | Publishers | Years | Search 
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...

Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland
Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland

ICALP 2011, the 38th edition of the International Colloquium on Automata, Languages and Programming, was held in Z¨urich, Switzerland, during July 4–8, 2011. ICALP is a series of annual conferences of the European Association for Theoretical Computer Science (EATCS) which first took place in 1972. This year, the ICALP...

Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Getting Started with OAuth 2.0
Getting Started with OAuth 2.0
I’ve been working with web-based APIs since 1999, building SOAP-based web services for internal IT applications and helping thousands of developers using Google’s RESTbased APIs for Google Calendar, Picasa Web Albums, YouTube, and more. Each of these APIs has required authorization from users to act on their behalf. Developers...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Learning Android Application Programming for the Kindle Fire: A Hands-On Guide to Building Your First Android Application
Learning Android Application Programming for the Kindle Fire: A Hands-On Guide to Building Your First Android Application

The Amazon Kindle Fire is one of the most exciting and popular new Android devices available to consumers and application developers alike. It‘s so popular, in fact, that in the six weeks the Amazon Kindle Fire was available for purchase at the end of 2011, 3.9 million units were sold, accounting for over 14 percent of the tablet...

A Quick Start Guide to Podcasting: Creating Your Own Audio and Visual Materials for iPods, Blackberries, Mobile Phones and Websites
A Quick Start Guide to Podcasting: Creating Your Own Audio and Visual Materials for iPods, Blackberries, Mobile Phones and Websites

We live in exciting times. The internet is arguably the fastest

growing cultural phenomenon in the world, ever. You and I are lucky enough to have been born in time to catch one of those moments in human history when everything changes. Right now we’re in the middle of a
...
Getting Started with RFID: Identify Objects in the Physical World with Arduino
Getting Started with RFID: Identify Objects in the Physical World with Arduino
The process of identifying physical objects is such a fundamental part of our experience that we seldom think about how we do it. We use our senses, of course: we look at, feel, pick up, shake and listen to, smell, and taste objects until we have a reference for them—then we give them a label. The whole...
Branding Yourself: How to Use Social Media to Invent or Reinvent Yourself (2nd Edition) (Que Biz-Tech)
Branding Yourself: How to Use Social Media to Invent or Reinvent Yourself (2nd Edition) (Que Biz-Tech)

Want a new job or career? Need to demonstrate more value to customers or employers? Use today’s hottest social media platforms to build the powerful personal brand that gets you what you want! In this completely updated book, Erik Deckers and Kyle Lacy help you use social media to attract new business and job...

Troubleshoot and Optimize Windows 8 Inside Out: The ultimate, in-depth troubleshooting and optimizing reference
Troubleshoot and Optimize Windows 8 Inside Out: The ultimate, in-depth troubleshooting and optimizing reference

You’re beyond the basics, so dive right into optimizing Windows® 8—and really put your PC or tablet to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting techniques, and workarounds. It’s all muscle and no fluff. Discover how the experts keep their Windows 8 systems...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Packaging the Brand: The Relationship Between Packaging Design and Brand Identity (Required Reading Range)
Packaging the Brand: The Relationship Between Packaging Design and Brand Identity (Required Reading Range)

 

Welcome to Packaging the Brand, a book that will introduce you to the design and creation of packaging as it forms part of the product branding process. This book aims to explore the many different ways by which brands come to be packaged and to consider
...
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy