Home | Amazing | Today | Tags | Publishers | Years | Search 
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Architecting Composite Applications and Services with TIBCO (TIBCO Press)
Architecting Composite Applications and Services with TIBCO (TIBCO Press)

The architecture series from TIBCO® Press comprises a coordinated set of titles for software architects and developers, showing how to combine TIBCO components to design and build real-world solutions. TIBCO’s product suite comprises components with functionality ranging from messaging through services, service...

Managing and Optimizing VMware vSphere Deployments
Managing and Optimizing VMware vSphere Deployments

In our experience as consultants, VMware vSphere is the most robust virtualization

solution on the market. The technology is proven and the user base is large.

Although the benefits of virtualization using vSphere are many, proper planning is required to gain these benefits from a vSphere
...
Adobe Creative Suite 6 Design & Web Premium Classroom in a Book
Adobe Creative Suite 6 Design & Web Premium Classroom in a Book

Creative professionals seeking the fastest, easiest, most comprehensive way to learn Creative Suite 6 choose Adobe Creative Suite 6 Design and Web Premium Classroom in a Book from the Adobe Creative Team at Adobe Press. The 6 project-based lessons show readers step-by-step the key techniques for working with the applications in the...

Food Safety Culture: Creating a Behavior-Based Food Safety Management System (Food Microbiology and Food Safety)
Food Safety Culture: Creating a Behavior-Based Food Safety Management System (Food Microbiology and Food Safety)
It has been said, what we know and what we believe is of little consequence. It is what we do that is important. When it comes to food safety, this point is certainly true.

The main reason I decided to write this book is simple. It’s because I wish I could have known 20 years ago (when I started my career in
...
Designing Information: Human Factors and Common Sense in Information Design
Designing Information: Human Factors and Common Sense in Information Design

“The book itself is a diagram of clarification, containing hundreds of examples of work by those who favor the communication of information over style and academic postulation—and those who don’t. Many blurbs such as this are written without a thorough reading of the book. Not so in this case. I read it and love it. I...

Harnessing Green IT: Principles and Practices (Wiley - IEEE)
Harnessing Green IT: Principles and Practices (Wiley - IEEE)

“Ultimately, this is a remarkable book, a practical testimonial, and a comprehensive bibliography rolled into one. It is a single, bright sword cut across the various murky green IT topics. And if my mistakes and lessons learned through the green IT journey are any indication, this book will be used every day by folks interested in...

Objective-C Programming For Dummies
Objective-C Programming For Dummies

A step-by-step guide to understanding object-oriented programming with Objective-C

As the primary programming language for iPhone, iPad, and Mac OS X applications, Objective-C is a reflective, object-oriented language that all programmers must know before creating apps. Assuming no prior programming language experience, this...

Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Java EE 6 Pocket Guide
Java EE 6 Pocket Guide
The Java EE 6 platform has taken ease-of-development in enterprise Java programming to new heights. This book is directed towards the audience who wants to get a quick overview of the platform and to keep coming back to learn the basics.

This book provides an overview of the key specifications
...
MOS 2010 Study Guide for Microsoft® Word Expert
MOS 2010 Study Guide for Microsoft® Word Expert

Desktop computing proficiency is increasingly important in today’s business world. As a result, when screening, hiring, and training employees, employers can feel reassured by relying on the objectivity and consistency of technology certification to ensure the competence of their workforce. As an employee or job seeker, you can use...

Result Page: 571 570 569 568 567 566 565 564 563 562 561 560 559 558 557 556 555 554 553 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy