 |
|
 |  |  Sams Teach Yourself Mac OS X Panther All In OneSams Teach Yourself Mac OS X Panther All in One is designed to teach, in one big book, the new Mac user how to easily work with his hardware, his operating system, and all the applications he is likely to want to use to work with digital media. The book does not assume the reader wants to learn how to use just one product, but covers multiple... |  |  Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware DevicesNagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of... |
|
 Wikipedia: The Missing ManualWhat made you write the book? In November 2006 I started working on an index for editors of Wikipedia – a single page that had links to all relevant policies, guidelines, how-to pages, reference pages, tools, and other things that an editor might conceivably want to read. The more I worked on the index, the... |  |  Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |  |  Information Technology Ethics: Cultural PerspectivesInformation Technology Ethics: Cultural Perspectives takes a global approach to the diverse ethical issues created by information and communication technologies and their possible resolutions. Comprehensive chapters describe the problems and possibilities of genuinely global information ethics, which are urgently needed as information and... |
|
 The Golden Ratio: The Story of Phi, the World's Most Astonishing NumberThroughout history, thinkers from mathematicians to theologians have pondered the mysterious relationship between numbers and the nature of reality. In this fascinating book, Mario Livio tells the tale of a number at the heart of that mystery: phi, or 1.6180339887...This curious mathematical relationship, widely known as "The Golden... |  |  Rape Investigation Handbook"This book is easy to read and follows a logical progression from the initial call to the courts. Anyone involved in dealing with sexual assault cases in any capacity would benefit from having this book in their library of reference texts." - www.crimeandclues.com
An unprecedented collaborative work -- the first... |  |  Sams Teach Yourself Visual C++.NET in 21 Days (2nd Edition)Sams Teach Yourself Visual C++.NET in 21 Days, 2nd Edition is a time-saving guide walking you through Visual C++ tools and wizards for building applications and places VC++ in the context of the new Visual Studio.NET environment. This book emphasizes using Visual C++ tools and wizards to generate code. Code examples are augmented with C++ language... |
|
 Virtual RealismFrom the simple VR games found in upscale video arcades, to the ultimate "immersion"--the CAVE, a surround screen, surround sound system that projects 3 D computer graphics into a ten-foot high cube--virtual reality has introduced what is literally a new dimension of reality to daily life. But it is not without controversy. Indeed, some... |  |  An Introduction to Neural NetworksCovers: artificial neurons as models of their real counterparts; the geometry of network action in pattern space; gradient descent methods, including back-propagation; associative memory and Hopfield nets; and self-organization and feature maps.
This book grew out of a set of course notes for a neural networks module given as part of a... |  |  UNIX and Linux Forensic Analysis DVD ToolkitThe only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account... |
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |