Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

Social Media and Integrated Marketing Communication: A Rhetorical Approach
Social Media and Integrated Marketing Communication: A Rhetorical Approach

Social Media and Integrated Marketing Communication: A Rhetorical Approach explores social media in the areas of corporate identity, brand narratives, and crisis response from a rhetorical perspective. Key ideas in this text are social media as epideictic rhetoric—the rhetorical...

CompTIA Security+ Review Guide: Exam SY0-401
CompTIA Security+ Review Guide: Exam SY0-401

Focused review for the CompTIA Security+ certification exam

The CompTIA Security+ certification offers tremendous opportunities for IT professionals. For those who want to take their careers to the next level, CompTIA Security+ Review Guide: Exam SY0-401 is here to serve as a great resource for certification...

Debates in Modern Philosophy: Essential Readings and Contemporary Responses (Key Debates in the History of Philosophy)
Debates in Modern Philosophy: Essential Readings and Contemporary Responses (Key Debates in the History of Philosophy)

Debates in Modern Philosophy: Essential Readings and Contemporary Responses provides an in-depth, engaging introduction to important issues in modern philosophy.  It presents 13 key interpretive debates to students, and ranges in coverage from Descartes' Meditations to Kant's Critique of Pure...

Pro Oracle Fusion Applications: Installation and Administration
Pro Oracle Fusion Applications: Installation and Administration

Pro Oracle Fusion Applications is your one-stop source for help with installing Oracle’s Fusion Applications suite in your on-premise environment. It also aids in the monitoring and ongoing administration of your Fusion environment. Author Tushar Thakker is widely known for his writings and expertise on Oracle Fusion...

Sport, Masculinities and the Body (Routledge Research in Sport, Culture and Society)
Sport, Masculinities and the Body (Routledge Research in Sport, Culture and Society)

This groundbreaking work explores masculinity and the body within sports. Sports continue to retain expectations for presentations of specific forms of masculinity. The body is central to these presentations. These everyday bodily performances are rehearsed and performed either successfully or unsuccessfully - and the consequences of these...

3D Face Processing: Modeling, Analysis and Synthesis (The International Series in Video Computing)
3D Face Processing: Modeling, Analysis and Synthesis (The International Series in Video Computing)
3D Face Processing: Modeling, Analysis and Synthesis introduces the frontiers of 3D face processing techniques. It reviews existing 3D face processing techniques, including techniques for 3D face geometry modeling; 3D face motion modeling; and 3D face motion tracking and animation. Then it discusses a unified framework for face...
Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities
Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities
Windows CardSpace empowers organizations to prevent identity theft and systematically address a broad spectrum of security and privacy challenges. Understanding Windows CardSpaceis the first insider’s guide to Windows CardSpace and the broader topic of identity management for technical and business professionals

Drawing on
...
Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Identity Management: Concepts, Technologies, and Systems
Identity Management: Concepts, Technologies, and Systems

Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and...

OpenStack Cloud Security
OpenStack Cloud Security

Build a secure OpenStack cloud to withstand all common attacks

About This Book

  • Design, implement, and deliver a safe and sound OpenStack cluster using best practices
  • Create a production-ready environment and protect your data on the cloud
  • A step-by-step tutorial packed with...
Encyclopedia of Modern Separatist Movements
Encyclopedia of Modern Separatist Movements
From Kosovo to Kashmir, from Northern Ireland to Nigeria, most conflicts in the world today are ethnic conflicts over territory. This encyclopedia covers ethnic separatism and related topics. Members of an ethnic group share a common culture and can be distinguished from members of other groups by some social characteristic such as race,...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy