Home | Amazing | Today | Tags | Publishers | Years | Search 
Leading IT Projects: The IT Manager's Guide
Leading IT Projects: The IT Manager's Guide
Senior level IT managers are responsible for a wide variety of development projects. For the most part, these individual projects are handled by project managers. However, IT managers must be conversant in the field of project management. Additionally, they must understand the dynamics of managing the project manager and be familiar with the skill...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Bookkeeping Workbook For Dummies (Business & Personal Finance)
Bookkeeping Workbook For Dummies (Business & Personal Finance)
If you're preparing for The American Institute of Professional Bookkeepers' (AIPB) bookkeeping certification test, you need an easy- to-follow test-preparation guide that gets you up to speed quickly in all of the bookkeeping basics, from setting up a company's books and recording transactions to managing employee payroll, handling government...
i -Net+ Study Guide
i -Net+ Study Guide

Here's the book you need to prepare for CompTIA's i-Net+ Exam. This Sybex Study Guide provides:

  • Full coverage of every exam objective
  • Practical information on network hardware
  • Hundreds of challenging review questions, in the book...
MCSE: ISA Server 2000 Administration Study Guide: Exam 70 227 with CDROM
MCSE: ISA Server 2000 Administration Study Guide: Exam 70 227 with CDROM

Here’s the book you need to prepare for Exam 70-227, Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 2000, Enterprise Edition:

  • In-depth coverage of every exam objective—all the information you need to know
  • Practical...
Information Processing and Routing in Wireless Sensor Networks
Information Processing and Routing in Wireless Sensor Networks
Wireless sensor networks (WSNs) have become an important technology in the realization of many applications, including both simple event/phenomena monitoring applications and heavy-duty data streaming applications. While many systems are being developed, we focus on two fundamental operations: information processing and information routing. In the...
Networks: Design and Management
Networks: Design and Management
Networks are groups of computers that communicate by either cable or wireless transmissions. By the use of computer networking, we can share data with others. Today, all businesses, small or large use some type of computers and most use computer networking to handle their daily business operations such as bookkeeping, inventory tracking, document...
Crime Mapping Case Studies: Practice and Research
Crime Mapping Case Studies: Practice and Research
Crime Mapping Case Studies: From Research to Practice provides a series of key examples from practice and research that demonstrate applications of crime mapping and its effect in many areas of policing and crime reduction. This book brings together case studies that show how crime mapping can be used for analysis,...
Detecting Lies and Deceit: Pitfalls and Opportunities (Wiley Series in Psychology of Crime, Policing and Law)
Detecting Lies and Deceit: Pitfalls and Opportunities (Wiley Series in Psychology of Crime, Policing and Law)

Why do people lie?

Do gender and personality differences affect how people lie?

How can lies be detected?

Detecting Lies and Deceit provides the most comprehensive review of deception to date. This revised edition provides an up-to-date...

Mobile Telemedicine: A Computing and Networking Perspective
Mobile Telemedicine: A Computing and Networking Perspective
Wireless and mobile telemedicine has drawn attention from health care providers and recipients, governments, industry, and researchers. Th ough various practices have been exercised, the realization of telemedicine depends on advances in computing and networking techniques. In recent decades technological development in computing and networking has...
SSL Remote Access VPNs (Networking Technology: Security)
SSL Remote Access VPNs (Networking Technology: Security)
This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable,...
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy