Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Cryptography (Undergraduate Texts in Mathematics)
Introduction to Cryptography (Undergraduate Texts in Mathematics)

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Drupal 7 Business Solutions
Drupal 7 Business Solutions

You can use the Drupal 7 content management framework to build a small business website rapidly. You may add blogs; images and image galleries; maps, e-commerce and shopping carts; social application integration including Twitter and Flickr, and more to your site to connect with your customers and make more money from your...

Learn cocos2d Game Development with iOS 5 (Learn Apress)
Learn cocos2d Game Development with iOS 5 (Learn Apress)

Did you ever imagine yourself writing a computer game and being able to make money selling it? With Apple’s iTunes App Store and the accompanying mobile devices iPhone, iPod touch, and iPad, it’s now easier than ever. Of course, that doesn’t mean it’s easy— there’s still a lot to learn about game...

Sams Teach Yourself Google AdWords in 10 Minutes (Sams Teach Yourself -- Minutes)
Sams Teach Yourself Google AdWords in 10 Minutes (Sams Teach Yourself -- Minutes)

Google AdWords is a huge opportunity for businesses and other organizations to improve their results from Google search, to increase sales, to try out new business ideas, and in general to make the Web friendlier. However, it’s also a way to spend money without realizing much return. Helping you to use AdWords effectively from...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Microsoft Project 2010 Inside Out
Microsoft Project 2010 Inside Out

Welcome to Microsoft Project 2010 Inside Out. This book is your comprehensive Project 2010 reference, in which you can learn not only the essentials, but also the intermediate topics and advanced techniques for using Project 2010 like a power user.

Conquer Microsoft Project 2010—from the inside out!

...

CCNA Cisco Certified Network Associate Study Guide, includes CD-ROM: Exam 640-802
CCNA Cisco Certified Network Associate Study Guide, includes CD-ROM: Exam 640-802

Welcome to the exciting world of Cisco certification! You have picked up this book because you want something better—namely, a better job with more satisfaction. Rest assured that you have made a good decision. Cisco certification can help you get your first networking job or more money and a...

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

The telegraph, telephone, radio, and especially the computer have put everyone on the globe within earshot— at the price of our privacy. It may feel like we're performing an intimate act when, sequestered in our rooms and cubicles, we casually use our cell phones and computers to transmit our thoughts, confidences,...

Umbraco User's Guide
Umbraco User's Guide

IT’S NOT ENOUGH these days to have a website. As a business or individual in today’s technology landscape, you must be able to adapt and change with new emerging technologies that seemingly pop up every day. There are thousands of solutions and implementation to consider, but only a select few are worth your precious time....

Recommender Systems: An Introduction
Recommender Systems: An Introduction

“Which digital camera should I buy? What is the best holiday for me and my family? Which is the best investment for supporting the education of my children? Which movie should I rent? Which web sites will I find interesting? Which book should I buy for my next vacation? Which degree and university are the best for my...

Advanced Crime Scene Photography
Advanced Crime Scene Photography

Advanced Crime Scene Photography developed over time and out of my experiences as a crime scene investigator with a large metropolitan police department. Like any major city, violent crime is prevalent, offering numerous opportunities to utilize the different skills and techniques learned and evolved through numerous schools, scene...

Android Fully Loaded
Android Fully Loaded

Adobe MAX is a conference sponsored by Adobe every year to bring together developers and designers who work with Adobe technologies and enable them to learn new techniques, network with one another, and, in general, get excited about the company and its products. Of course, the attendees of a conference like MAX are almost by...

Result Page: 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy