Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security 2020: Reduce Security Risks This Decade
Security 2020: Reduce Security Risks This Decade

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT...

Beginning Oracle Application Express 4.2
Beginning Oracle Application Express 4.2

Beginning Oracle Application Express 4.2 introduces version 4.2 of the popular and productive Oracle Application Express development platform. Called APEX for short, the platform enables rapid and easy development of web-based applications that make full use of Oracle Database. The release of APEX 4.2 brings extensive new...

Manga Studio 5, Beginner's Guide
Manga Studio 5, Beginner's Guide

An extensive and fun guide to let your imagination on loose using Manga Studio 5

Overview

  • Illustrated with real-world examples, we embark on a journey of a comic's creation from initial idea to finished page
  • Discover methods for emulating analog creation digitally and investigate ways...
Novel Therapeutic Targets for Antiarrhythmic Drugs
Novel Therapeutic Targets for Antiarrhythmic Drugs

Profiles potential treatment approaches for cardiac arrhythmias

Cardiac arrhythmias of ventricular origin are responsible for the deaths of nearly half a million Americans each year while atrial fibrillation accounts for about 2.3 million cases per year, a rate that is projected to increase 2.5 fold over the next half...

Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python
Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python

Develop real-world applications powered by the latest advances in intelligent systems

Key Features

  • Gain real-world contextualization using deep learning problems concerning research and application
  • Get to know the best practices to improve and optimize your machine...
Ageing and Life Extension of Offshore Structures: The Challenge of Managing Structural Integrity
Ageing and Life Extension of Offshore Structures: The Challenge of Managing Structural Integrity
A comprehensive overview of managing and assessing safety and functionality of ageing offshore structures and pipelines
A significant proportion, estimated at over 50%, of the worldwide infrastructure of offshore structures is in a life extension phase and is vulnerable to ageing processes. This book captures the central
...
Thinking Animation: Bridging the Gap Between 2D and CG
Thinking Animation: Bridging the Gap Between 2D and CG
Learn how to think before you animate. Thinking Animation is a one-of-a-kind book that emphasizes how artists can use traditional animation techniques and principles with the computer generated animation technology of today. Written by seasoned animators with experience in both 2D and CG, Thinking Animation is an exquisite guide aimed at...
The Radio Station, Seventh Edition: Broadcast, Satellite & Internet
The Radio Station, Seventh Edition: Broadcast, Satellite & Internet
Keith's masterful updated survey of what has changed and what remains the same in the dynamic audio industry.
- Christopher Sterling,
George Washington University

The bible for beginning radio professionals. A complete guide to the internal workings of radio stations and the radio industry. The book is now a
...
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
Silverlight 2 Recipes: A Problem-Solution Approach (Expert's Voice in .Net)
Silverlight 2 Recipes: A Problem-Solution Approach (Expert's Voice in .Net)
Microsoft .NET Architect Evangelist, Jit Ghosh, presents a practical companion guide to developing rich, interactive web applications with Silverlight 2. Common problems, issues, and every–day scenarios are tackled with a detailed discussion of the solution and ready–made code recipes that will save you hours of coding...
unlimited object storage image
Result Page: 342 341 340 339 338 337 336 335 334 333 332 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy