Home | Amazing | Today | Tags | Publishers | Years | Search 
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
SAS 9.2 SQL Procedure User's Guide
SAS 9.2 SQL Procedure User's Guide
Describes the basics of using PROC SQL, including retrieving data from single and multiple tables; selecting specific data from tables; subsetting, ordering, and summarizing data; updating tables; combining tables to create new tables and useful reports; performing queries on database management system (DBMS) tables; using PROC SQL with the SAS...
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Reverse Engineering Deals on Wall Street with Microsoft Excel: A Step-by-Step Guide (Wiley Finance)
Economics / Investments & Securities

Praise for Reverse Engineering Deals on Wall Street with Microsoft Excel

"Allman has written an excellent sequel to his first book Modeling Structured Finance Cash Flows with Microsoft Excel, providing a simple guide on how to deconstruct cash flows through modeling and understanding...

Data Mining in Grid Computing Environments
Data Mining in Grid Computing Environments

Based around eleven international real life case studies and including contributions from leading experts in the field this groundbreaking book explores the need for the grid-enabling of data mining applications and provides a comprehensive study of the technology, techniques and management skills necessary to create them. This book provides...

Newnes Electrical Pocket Book, Twenty-third Edition
Newnes Electrical Pocket Book, Twenty-third Edition
The ideal daily reference source for electrical engineers, electricians and students.

Newnes Electrical Pocket Book is the ideal daily reference source for electrical engineers, electricians and students. First published in 1932 this classic has been fully updated in line with the latest technical developments, regulations
...
Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs, and the World Economy
Pirates of the Digital Millennium: How the Intellectual Property Wars Damage Our Personal Freedoms, Our Jobs, and the World Economy
Digital piracy. It's a global war -- and it's just begun. Pirates of the Digital Millennium chronicles that war. All of it: media conglomerates vs. teenagers, tech companies vs. content providers, artists battling artists, nations vs. nations, law enforcement vs. organized crime. John Gantz and Jack Rochester cover every side and all the...
Open-Source ESBs in Action
Open-Source ESBs in Action
Most modern business systems include independent applications that exchange information with each other-a technique usually called enterprise integration. An architectural approach called the Enterprise Service Bus (ESB) offers developers a way to handle the messages between those independent applications without creating a lot of custom code....
Investigating Computer Crime
Investigating Computer Crime
Investigating Computer Crime will prove a welcome addition to any security department's library.
-Security Management

Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the
...
Cross-Platform Game Programming (Game Development)
Cross-Platform Game Programming (Game Development)
With many of today’s games being released simultaneously on all platforms, the need for a good cross-platform development strategy is essential. Cross-Platform Game Programming covers this rarely discussed area and provides the techniques needed to develop your games effectively. It explains the plethora of problems that exist within every...
Building Firewalls with OpenBSD and PF, 2nd Edition
Building Firewalls with OpenBSD and PF, 2nd Edition
Written by Jacek Artymiak, a frequent contributor to ONLamp.com, Building Firewalls with OpenBSD and PF is the first and only print publication devoted solely to the subject of the pf packet filter used in OpenBSD, FreeBSD, and NetBSD operating systems. Topics covered include: firewall design, ruleset syntax, packet normalization (scrubbing),...
Agile Web Development with Rails, Third Edition
Agile Web Development with Rails, Third Edition
You want to write professional-grade applications: Rails is a full-stack, open-source web framework, with integrated support for unit, functional, and integration testing. It enforces good design principles, consistency of code across your team (and across your organization), and proper release management.

But Rails is more than a set of best...

Common SAP R/3 Functions Manual (Springer Professional Computing)
Common SAP R/3 Functions Manual (Springer Professional Computing)
"At last a user-friendly reference that documents hundreds of the most useful ABAP routines currently in use. This book is essential for ABAP consultants, project engineers, and programmers who want to save both time and money and avoid having to reinvent the wheel." Robert G. Drake, Course Leader, Sheffield Hallam University, UK...
Result Page: 603 602 601 600 599 598 597 596 595 594 593 592 591 590 589 588 587 586 585 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy