Home | Amazing | Today | Tags | Publishers | Years | Search 
LPIC-1: Linux Professional Institute Certification Study Guide: (Exams 101 and 102)
LPIC-1: Linux Professional Institute Certification Study Guide: (Exams 101 and 102)

Updated for the latest LPIC-1 Exams 101 and 102

The LPIC-1 certification measures your understanding of the Linux Kernel. As the Linux server market continues to grow, so does the demand for certified Linux administrators. Prepare for the latest versions of the LPIC-1 exams 101 and 102 with the new edition of this detailed Study...

Information theory and statistics
Information theory and statistics
Highly useful text studies logarithmic measures of information and their application to testing statistical hypotheses. Includes numerous worked examples and problems. References. Glossary. Appendix....
Computer Crime: A Crimefighter's Handbook (Computer Security)
Computer Crime: A Crimefighter's Handbook (Computer Security)

Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up...

Mathematics for Life Science and Medicine (Biological and Medical Physics, Biomedical Engineering)
Mathematics for Life Science and Medicine (Biological and Medical Physics, Biomedical Engineering)
Dynamical systems theory in mathematical biology and environmental science has attracted much attention from many scientific fields as well as mathematics. For example, “chaos” is one of its typical topics. Recently the preservation of endangered species has become one of the most important issues in biology and...
SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)

Vast amounts of data are nowadays collected, stored and processed, in an effort to assist in  making a variety of administrative and governmental decisions. These innovative steps considerably improve the speed, effectiveness and quality of decisions. Analyses are increasingly performed by data mining and profiling technologies that...

High-Impact Human Capital Strategy: Addressing the 12 Major Challenges Today's Organizations Face
High-Impact Human Capital Strategy: Addressing the 12 Major Challenges Today's Organizations Face

Traditionally, human resources has focused on recruiting good people, preparing them for assignments, motivating them to perform, and retaining them. These functions remain essential, but to be successful in turbulent times like ours, human capital strategy needs to be broader and much more far-reaching. High-Impact Human Capital Strategy...

Current Practice Guidelines in Primary Care: 2007
Current Practice Guidelines in Primary Care: 2007

The ultimate at-a-glance clinical companion - updated annually

  • The most current screening, prevention, and management guidelines for more than 60 common outpatient conditions
  • Content drawn from a wide array of recommendations regularly updated by government agencies, medical and scientific...
Protecting Networks with SATAN
Protecting Networks with SATAN

SATAN (Security Administrator's Tool for Analyzing Networks) is a powerful aid for system administrators. It performs "security audits," scanning host computers for security vulnerabilities caused by erroneous configurations or by known software errors in frequently used programs. SATAN is a particularly interesting piece of...

Operations Forensics: Business Performance Analysis Using Operations Measures and Tools
Operations Forensics: Business Performance Analysis Using Operations Measures and Tools

Investors and analysts often need to look into a firm's operations more deeply than traditional financial statements and models allow. This book describes newly developed tools for using operations metrics to discern and influence the valuation of a firm. It is the first to present these techniques from a unified perspective: that of...

Smart Grid Security: Innovative Solutions for a Modernized Grid
Smart Grid Security: Innovative Solutions for a Modernized Grid

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power...

Chemosensitivity: Volume I: In Vitro Assays (Methods in Molecular Medicine)
Chemosensitivity: Volume I: In Vitro Assays (Methods in Molecular Medicine)

A state-of-the art collection of readily reproducible laboratory methods for assessing chemosensitivity in vitro and in vivo, and for assessing the parameters that modulate chemosensitivity in individual tumors. Chemosensitivity, Volume 1: In Vitro Assays provides a panel of 16 in vitro measures of chemosensitivity in adherent and...

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy