Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Credibility Assessment: Scientific Research and Applications
Credibility Assessment: Scientific Research and Applications

In 2001, the late Murray Kleiner and an array of experts contributed to the Handbook of Polygraph Testing, published by Elsevier, which examined the fundamental principles behind polygraph tests and reviewed the key tests and methods used at that time. In the intervening thirteen years, the field has moved beyond traditional polygraph...

Beginning SUSE Linux: From Novice to Professional
Beginning SUSE Linux: From Novice to Professional

Beginning SUSE Linux is designed for you newcomers to Linux. It aims to take you all the way to the ranks of expert as quickly as possible. It logically starts by setting the scene, explaining the background of Linux, then showing how to install the software on your system, use the basic functions, and tweak it's look and feel to...

Bulletproofing TCP/IP Based Windows NT/2000 Networks
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of...
Key Performance Indicators (KPI): Developing, Implementing, and Using Winning KPIs
Key Performance Indicators (KPI): Developing, Implementing, and Using Winning KPIs

An in-depth look at how to create and use key performance indicators (KPIs), from the King of KPIs – now updated and expanded!

By exploring measures that have transformed businesses, David Parmenter has developed a methodology that is breathtaking in its simplicity and yet profound in its impact. Now in an updated and...

QlikView 11 for Developers: Effective analytics techniques for modern Business Intelligence
QlikView 11 for Developers: Effective analytics techniques for modern Business Intelligence

Gain an in-depth understanding of how to build applications for Business Intelligence using QlikView

Key Features

  • Learn to build applications for Business Intelligence while following a practical case - HighCloud Airlines. Each chapter develops parts of the application and it evolves throughout the book...
Football Traumatology: Current Concepts: from Prevention to Treatment
Football Traumatology: Current Concepts: from Prevention to Treatment

Football is probably the most widespread sport in the world. Like many other sports football has undergone major changes. It has increased in intensity, speed, and other factors contributing to increased risks of traumatic injury. Footballers, trainers, and the sport's medical staff are asking for greater information on the traumatic...

Inside the Security Mind: Making the Tough Decisions
Inside the Security Mind: Making the Tough Decisions
Organizations today commit ever-increasing resources to information security, but are scarcely more secure than they were four or five years ago! By treating information security like an ordinary technological practice—that is, by throwing money, a handful of the latest technologies, and a lineup of gurus at the problem—they...
A Practical Guide to Security Engineering and Information Assurance
A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system....

Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers,...
Improving Energy Efficiency in Industrial Energy Systems: An Interdisciplinary Perspective on Barriers, Energy Audits, Energy Management, Policies, and Programs (Green Energy and Technology)
Improving Energy Efficiency in Industrial Energy Systems: An Interdisciplinary Perspective on Barriers, Energy Audits, Energy Management, Policies, and Programs (Green Energy and Technology)

Industrial energy efficiency is one of the most important means of reducing the threat of increased global warming. Research however states that despite the existence of numerous technical energy efficiency measures, its deployment is hindered by the existence of various barriers to energy efficiency. The complexity of increasing energy...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
MCAD Developing and Implementing Web Applications with Microsoft Visual C# .NET and Microsoft Visual Studio  .NET Exam Cram 2 (Exam Cram 70-315)
MCAD Developing and Implementing Web Applications with Microsoft Visual C# .NET and Microsoft Visual Studio .NET Exam Cram 2 (Exam Cram 70-315)
This certification exam measures the ability to develop and implement Windows-based applications with Web forms, ASP.NET, and the Microsoft .NET Framework. This exam counts as a core credit toward the new MCAD (Microsoft Certified Application Developer) certification as well as a core credit toward the MCSD .NET certification. This book is not...
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy