Home | Amazing | Today | Tags | Publishers | Years | Search 
The Best Damn Cybercrime and Forensics Book Period
The Best Damn Cybercrime and Forensics Book Period
As is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.

If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the
...
Models of Computation: Exploring the Power of Computing
Models of Computation: Exploring the Power of Computing
Your book fills the gap which all of us felt existed too long. Congratulations on this excellent contribution to our field."

--Jan van Leeuwen, Utrecht University

"This is an impressive book. The subject has been thoroughly researched and carefully presented. All the machine models central to the modern theory of...

Laptops and Tablet PCs with Microsoft  Windows  XP Step by Step: Keep in Touch and Stay Productive--At Work, At Home, and On the Go!
Laptops and Tablet PCs with Microsoft Windows XP Step by Step: Keep in Touch and Stay Productive--At Work, At Home, and On the Go!
The easiest way to go mobile with Windows XPone step at a time! Teach yourself exactly what you need to know about using your laptop, notebook, or Tablet PC to stay connected and productive at the office, at home, and on the road. With Step by Step, you work at your own pace through easy-to-follow lessons and practice files on CD. For the office,...
Mac OS X Leopard Pocket Guide (Pocket Reference)
Mac OS X Leopard Pocket Guide (Pocket Reference)
No matter how much Mac experience you have, Mac OS X Leopard requires that you get reacquainted. This little guide is packed with more than 300 tips and techniques to help you do just that. You get all details you need to learn Leopard's new features, configure your system, and get the most out of your Mac. Pronto. Mac OS X Leopard Pocket Guide...
Managing and Mining Multimedia Databases
Managing and Mining Multimedia Databases
Reading Data Mining by Bhavani Thuraisingham is a poignant experience masterful and readable summary of her field...a profound overview of an important domain of human knowledge a memorable opus.
-Dr. Dobb's Journal

There is now so much data on the Web that managing it with conventional tools is becoming almost
...
Programming Language Pragmatics, Second Edition
Programming Language Pragmatics, Second Edition
"Michael Scott's book could have been entitled: Why Programming Languages Work. It takes a fresh look at programming languages by bringing together ideas and techniques usually covered in disparate language design, compiler, computer architecture, and operating system courses. Its comprehensive and integrated presentation of language...
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find...

mod_perl Developer's Cookbook (Developer's Library)
mod_perl Developer's Cookbook (Developer's Library)
mod_perl is a unique piece of software that wholly integrates the power of Perl with the flexibility and stability of the Apache Web server. With mod_perl, developers can harness the power of the full Apache API and develop Web applications quickly and without sacrificing performance.

The mod_perl Developer's Cookbook teaches
...
Mac OS X Leopard QuickSteps
Mac OS X Leopard QuickSteps
Step-by-Step, Full-Color Graphics!

Get started using Mac OS X 10.5 Leopard right away--the QuickSteps way. Color screenshots and clear instructions show you how to use all the new and improved features available in...

Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Understanding Flash MX 2004 ActionScript 2: Basic techniques for creatives
Understanding Flash MX 2004 ActionScript 2: Basic techniques for creatives
Step-by-step techniques, illustrated with highly visual examples throughout the book, show you how to build up your ActionScripting skills quickly and effectively. A support website provides all the content you need to try out the techniques shown in the book for yourself.

Ideal for those studying multimedia and information technology
...
Practical Artistry: Light & Exposure for Digital Photographers
Practical Artistry: Light & Exposure for Digital Photographers
You may be passionate about photography, and own a digital SLR with perhaps more advanced equipment as well. But do the photographs you take with this powerful equipment come out as well as you'd like?

With this fascinating and beautifully illustrated book, you learn how to apply the techniques and principles of classic photography
...
Result Page: 1008 1007 1006 1005 1004 1003 1002 1001 1000 999 998 997 996 995 994 993 992 991 990 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy