 |
|
|
|
 The Art of Error Correcting CodingBuilding on the success of the first edition, which offered a practical introductory approach to the techniques of error concealment, this book, now fully revised and updated, provides a comprehensive treatment of the subject and includes a wealth of additional features. The Art of Error Correcting Coding, Second Edition explores... |  |  Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen... |  |  Deploying Windows 2000 with Support ToolsVisually, Windows 2000 is similar to previous versions of Windows. Its extensive new functionality, the overriding goal of which is to reduce an organization's "total cost of ownership," however, makes the system administrator's life easier. This translates to quicker software installation, more efficient management, and easier... |
|
 Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion—or also simply called OS X
Lion—is the latest version of the computer
operating system that put the phrase
graphic user interface in everyone’s
vocabulary. With Mac OS, you can point,
click, and drag to work with files, applications,
and utilities. Because the same
intuitive interface... |  |  WildFly: New Features
Get acquainted with the exciting new features that WildFly has to offer with this book and ebook
Overview
-
Learn about the latest WildFly components, including CLI management, classloading, and custom modules
-
Customize your web server and applications by managing logs, virtual hosts, and the...
|  |  Sams Teach Yourself Sap R/3 in 10 MinutesSams Teach Yourself SAP R/3 in 10 Minutes covers general tasks including basic navigation skills, working with master data, and running reports. With timesaving tips, plain english definitions, panic button advice, and easy-to-follow tutorials that can be completed in 10 minutes or less, you will be immediately... |
|
 Data Mining Tools for Malware Detection
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop... |  |  |  |  Test Equating, Scaling, and Linking: Methods and Practices
This book provides an introduction to test equating, scaling and linking, including those concepts and practical issues that are critical for developers and all other testing professionals. In addition to statistical procedures, successful equating, scaling and linking involves many aspects of testing, including procedures to develop tests,... |
|
 |  |  Mac OS X Power HoundYou're about to gain insight into Mac OS X, an elegant operating system with Formula One power under the hood. This book is like your pit crew, helping you find easier, faster, and better ways of using the Finder, the Dock, the assortment of programs that come with Mac OS X, and a bunch of programs that don't. And if you want to become your own... |  |  SharePoint 2010 How-To
Need fast, reliable, easy-to-implement solutions for SharePoint 2010? This book delivers exactly what you’re looking for: step-by-step help and guidance with the tasks that users, authors, content managers, and site managers perform most often. Fully updated to reflect SharePoint 2010’s latest improvements,... |
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 |