Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Digital Video Broadcasting: Technology, Standards, and Regulations
Digital Video Broadcasting: Technology, Standards, and Regulations
Many books and articles on the transition of television from analog to digital transmission have been published in recent years. This transition is still in its infancy, but it will inevitably take place in the years to come. Due to digitization, the existing barriers between audio, video, and data generation and transmission...
Interfaces on Trial 2.0 (The Information Society Series)
Interfaces on Trial 2.0 (The Information Society Series)

We live in an interoperable world. Computer hardware and software products from different manufacturers can exchange data within local networks and around the world using the Internet. The competition enabled by this compatibility between devices has led to fast-paced innovation and prices low enough to allow ordinary users to command...

Food Supply Chain Management
Food Supply Chain Management
Food is always a matter of interest, a means of providing energy, the raw material that builds and maintains our well-being, a defence against illness, a pleasure to consume when well prepared and presented, a basis for social interaction and enjoyment at home, in a restaurant, canteen or perhaps even hospital or school. Our...
Women in Biotechnology: Creating Interfaces
Women in Biotechnology: Creating Interfaces
Biotechnologies, such as genetic engineering, cloning and biodiversity, raise many legal and ethical concerns, so it is important that people understand these issues and feel able to express their opinions. This is why the European Commission has been, for a number of years, supporting actions to improve communication among...
12 Essential Skills for Software Architects
12 Essential Skills for Software Architects
As you start reading this book, I hope you are prepared to keep an open mind and are willing to try some new approaches to your daily life.

My name is Dave Hendricksen, and I have the privilege of being a software architect for Thomson Reuters, where the focus of my work is on producing intelligent legal
...
CompTIA Healthcare IT Technician HIT-001 Authorized Cert Guide (Cert Guides)
CompTIA Healthcare IT Technician HIT-001 Authorized Cert Guide (Cert Guides)

This study guide helps you master all the topics on the new Healthcare IT Technician HIT-001 exam, including

  • Healthcare IT roles and trends
  • Standards agencies, laws, and regulations
  • ...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Digital Privacy: PRIME - Privacy and Identity Management for Europe
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Information technologies are becoming pervasive and powerful to the point that the privacy of citizens is now at risk. Indeed, more and more of our daily transactions are conducted electronically and require us to transmit personal information. Examples include using an electronic identity card to prove one’s age in a...
Intellectual Property: The Law of Trademarks, Copyrights, Patents, and Trade Secrets for the Paralegal
Intellectual Property: The Law of Trademarks, Copyrights, Patents, and Trade Secrets for the Paralegal

The field of intellectual property (typically referred to as IP) is one that continues its rapid growth. Just a few years ago, individuals who identifi ed themselves as practitioners in the fi eld of intellectual property were met with blank stares. Now IP professionals are in constant demand, and it is a rare issue of any legal newspaper...

Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy