Home | Amazing | Today | Tags | Publishers | Years | Search 
CompTIA Project+ Study Guide: Exam PK0-003
CompTIA Project+ Study Guide: Exam PK0-003

Prepare for CompTIA's newly updated Project+ certification exam

CompTIA is offering the first major update to its Project+ certification in six years, and this in-depth study guide from project management industry experts Kim and William Heldman is the perfect preparation for the new exam. You'll find complete...

Blue Ocean Strategy: How to Create Uncontested Market Space and Make Competition Irrelevant
Blue Ocean Strategy: How to Create Uncontested Market Space and Make Competition Irrelevant

Written by the business world's new gurus, Blue Ocean Strategy continues to challenge everything you thought you knew about competing in today's crowded market place. Based on a study of 150 strategic moves spanning more than a hundred years and thirty industries, authors W. Chan Kim and Renee Mauborgne argue that lasting...

Information Security For The Little Guy
Information Security For The Little Guy
Being secure in an insecure world is a tough nut to crack. There are so many ways that our personal information can be stolen and duplicated today it is a very serious situation and should be taken very seriously.

From our surfing the Internet to just the simplicity of speaking on a cell phone to our friends can
...
Transactions on Data Hiding and Multimedia Security VI
Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed introduction of these four papers, please refer to the Preface written by the organizers...
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Formal Verification of Object-Oriented Software: International Conference, FoVeOOS 2010
Formal Verification of Object-Oriented Software: International Conference, FoVeOOS 2010

Formal software verification has outgrown the area of academic case studies, and industry is showing serious interest. The logical next goal is the verification of industrial software products. Most programming languages used in industrial practice are object-oriented, e.g., Java, C++, or C#. The International Conference on Formal...

Syntax-Based Collocation Extraction (Text, Speech and Language Technology)
Syntax-Based Collocation Extraction (Text, Speech and Language Technology)

Syntax-Based Collocation Extraction is the first book to offer a comprehensive, up-to-date review of the theoretical and applied work on word collocations. Backed by solid theoretical results, the computational experiments described based on data in four languages provide support for the book’s basic argument for using syntax-driven...

JavaFX Developer's Guide
JavaFX Developer's Guide

Updated for JavaFX 1.3

 

The JavaFX platform makes it possible to write applications that can be deployed across devices ranging from cell phones to desktops, with little or no change required. JavaFX applications are written...

Coaching Into Greatness: 4 Steps to Success in Business and Life
Coaching Into Greatness: 4 Steps to Success in Business and Life

Internationally acclaimed business coach and consultant Kim George provides an easy-to-master process for coaches to bring out innate greatness and achieve peak performance. George introduces a new kind of intelligence quotient, Abundance Intelligence. AQ is the key to living into greatness, moving from a mentality of scarcity to one of...

Ninja Mind Control
Ninja Mind Control
Now you can unlock the ancient secrets of Ninja mind control and discover for yourself the fantastic powers of the legendary Ninja warriors. By combining simple methods of meditation with aggressive maneuvers, you can become the master of any situation--from the author of Ninja Secrets of Invisibility.

NINJA MIND CONTROL is, without
...
Automated Face Analysis: Emerging Technologies and Research
Automated Face Analysis: Emerging Technologies and Research
Since research on face recognition began in the 1960's, the field has rapidly widened to automated face analysis including face detection, facial gesture recognition, and facial expression recognition.

Automated Face Analysis: Emerging Technologies and Research provides theoretical background to understand the overall...

Oracle Data Guard 11g Handbook (Osborne ORACLE Press Series)
Oracle Data Guard 11g Handbook (Osborne ORACLE Press Series)

Provide superior data protection, availability, and disaster recovery using the tested techniques in this Oracle Press guide. Cowritten by a team of Oracle experts, Oracle Data Guard 11g Handbook provides a sound architectural foundation along with best practices for configuration, monitoring, maintenance, and troubleshooting. You...

Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy