Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Learning Flex 3: Getting up to Speed with Rich Internet Applications (Adobe Developer Library)
Learning Flex 3: Getting up to Speed with Rich Internet Applications (Adobe Developer Library)
How soon can you learn Adobe Flex 3? With this book's unique hands-on approach, you will be able to tinker with examples right away, and create your own Rich Internet Applications with Flex within the first few chapters. As you progress, you learn how to build a layout, add interactivity, work with data, and deploy your applications to either the...
Illiberal Liberal States
Illiberal Liberal States

Understanding the dynamics of the illiberal practices of liberal states is increasingly important in Europe today. This book examines the changing relationship and interaction between immigration, citizenship and integration at the European and national arenas. It studies some of the main effects and open questions as regards the...

Operating System Concepts with Java
Operating System Concepts with Java
Operating systems are an essential part of any computer system. Similarly, a course on operating systems is an essential part of any computer-science education. This field is undergoing rapid change, as computers are now prevalent in virtually every application, from games for children through the most sophisticated planning...
Getting Started with Grunt: The JavaScript Task Runner
Getting Started with Grunt: The JavaScript Task Runner

A hands-on approach to mastering the fundamentals of Grunt

Overview

  • Gain insight on the core concepts of Grunt, Node.js and npm to get started with Grunt.
  • Learn how to install, configure, run, and customize Grunt
  • Example-driven and filled with tips to help you create custom...
Control Engineering: A Modern Approach
Control Engineering: A Modern Approach

An exciting new text for the advanced controls course, Control Engineering: A Modern Approach breaks with tradition by introducing a number of new topics--robust controls, for example--and omitting a number of topics dated by the use of digital computers. Bélanger gives the student a real introduction to control engineering...

Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)
Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)

Today’s society is completely dependent on critical networks such as  water supply, sewage, electricity, ICT and transportation. Risk and vulnerability analyses are needed to grasp the impact of threats and hazards. However, these become quite complex as there are strong interdependencies both within and between infrastructure...

Python 3 Text Processing with NLTK 3 Cookbook
Python 3 Text Processing with NLTK 3 Cookbook

Over 80 practical recipes on natural language processing techniques using Python's NLTK 3.0

About This Book

  • Break text down into its component parts for spelling correction, feature extraction, and phrase transformation
  • Learn how to do custom sentiment analysis and named entity...
New Approaches to CSR, Sustainability and Accountability, Volume I (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
New Approaches to CSR, Sustainability and Accountability, Volume I (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
This book provides a platform for discussing the challenges that organizations face in order to implement sustainability, ethics, and effective corporate governance, all of which are important elements of “standing out” from other companies. Examining the background of the New European Consensus on development with the new...
Queueing Theory with Applications to Packet Telecommunication
Queueing Theory with Applications to Packet Telecommunication
Soon after Samuel Morse’s telegraphing device led to a deployed electrical
telecommunications system in 1843, waiting lines began to form by those
wanting to use the system. At this writing queueing is still a significant factor in
designing and operating communications services, whether they are provided
over the Internet
...
PCs For Dummies Quick Reference (Computer/Tech)
PCs For Dummies Quick Reference (Computer/Tech)
Fast answers to frequently asked questions

All the PC essentials at your fingertips!

If you like your answers quick and your information up-to-date, look no further. This concise, superbly organized reference walks you through setting up a PC, connecting all the parts, using programs, organizing your stuff, storing things on disk,...

Concurrency Theory: Calculi an Automata for Modelling Untimed and Timed Concurrent Systems
Concurrency Theory: Calculi an Automata for Modelling Untimed and Timed Concurrent Systems
In the world we live in concurrency is the norm. For example, the human body
is a massively concurrent system, comprising a huge number of cells, all simultaneously
evolving and independently engaging in their individual biological
processing. In addition, in the biological world, truly sequential systems rarely
arise. However,
...
Result Page: 288 287 286 285 284 283 282 281 280 279 278 277 276 275 274 273 272 271 270 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy