Home | Amazing | Today | Tags | Publishers | Years | Search 
Principles of Cybercrime
Principles of Cybercrime

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every...

Professional Blogging For Dummies
Professional Blogging For Dummies

Take your hobby to the next level and turn your blog into real income

Anyone who blogs knows that it is a fun, creative way for sharing thoughts and opinions. Now imagine making money from that hobby! This practical, how-to guide shows you how you can get serious about using your blog and implement advertising, sponsorship,...

Talent Is Not Enough: Business Secrets For Designers (2nd Edition)
Talent Is Not Enough: Business Secrets For Designers (2nd Edition)

The best business guide for design professionals just got better! This revised and expanded second edition includes everything designers need—besides talent—to turn their artistic success into business success. You’ll find information on key issues facing designers from freelancing to managing...

Gender Issues and Sexuality: Essential Primary Sources
Gender Issues and Sexuality: Essential Primary Sources

Gender Issues and Sexuality: Essential Primary Sources provides insight into the personal, social, and political issues of gender and sexuality—issues that range from what many hold as intimate matters of personal belief to matters that stir, shake, and thus profoundly shape modern society.

The women’s rights and gay...

iPad For Seniors For Dummies (Computer/Tech)
iPad For Seniors For Dummies (Computer/Tech)

The full-color guide to the exciting new iPad, written specifically with the needs of seniors in mind!

The iPad is the perfect device for the senior market, combining the Web, e-mail, photos, video, and book reading into an intuitive, portable device. Written by veteran Dummies author Nancy Muir, this fun and friendly guide...

Corporate Blogging For Dummies
Corporate Blogging For Dummies

Establish a successful corporate blog to reach your customers

Corporate blogs require careful planning and attention to legal and corporate policies in order for them to be productive and effective. This fun, friendly, and practical guide walks you through using blogging as a first line of communication to customers and...

Internet Crimes, Torts and Scams: Investigation and Remedies
Internet Crimes, Torts and Scams: Investigation and Remedies

Internet Crimes, Torts and Scams: Investigation and Remedies helps attorneys understand the increasing range of illegal and malicious internet activity and a similarly expanding number of response or enforcement options. Reflecting a "real-world" dynamic, the book is problem-oriented and cuts across many practice areas including...

Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier
Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier

The Internet is like the Old West a frontier rich with opportunity and hope, but also a rough-and-tumble land of questionable characters, dubious legal jurisdictions, and hidden dangers. And just like the Old West, if you want to stake out your territory, you have to get there first and fend for yourself. On the web, that means defending your...

Handbook of Digital Forensics and Investigation
Handbook of Digital Forensics and Investigation

The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field.

This unique collection details how to
...

Information Security Fundamentals
Information Security Fundamentals

The purpose of information security is to protect an organization’s valuable resources, such as information, computer hardware, and software. Through the selection and application of appropriate safeguards, security helps the organization’s mission by protecting its physical and financial resources, reputation, legal position,...

Special Edition Using WordPerfect 12
Special Edition Using WordPerfect 12

This must have reference on WordPerfect 12, is crammed full with tips, tricks, and practical examples not found anywhere else.

This is the most comprehensive and up-to-date book on the market today.

Title is backed and promoted by WordPerfect Universe (most popular WP site), and wpwriter.com (one of the top 3 WP web...

Breakthrough Discoveries in Information Technology Research: Advancing Trends
Breakthrough Discoveries in Information Technology Research: Advancing Trends

This collection, entitled Breakthrough Discoveries in Information Technology Research: Advancing Trends , aims to inform researchers and practitioners of novel and emerging research in information science and technology, allowing for the discussion and dissemination of critical concepts that will promote further study and innovation....

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy