Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Running an Agile Software Development Project
Running an Agile Software Development Project
A Practical Approach To Building Small To Medium Software Systems For Real Business Clients

Based on more than 100 actual commercial projects, this book clearly explains how to run an agile software development project that delivers high-quality, high-value solutions to business clients. It concentrates on the practical,...

WordPress 3 Ultimate Security
WordPress 3 Ultimate Security

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both.

Whether you've been successfully hacked already, else...

Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
BackTrack 5 Cookbook
BackTrack 5 Cookbook

Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5

  • Learn to perform penetration tests with BackTrack 5
  • Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
  • Provides detailed...
Electrical and Electronic Principles and Technology
Electrical and Electronic Principles and Technology
In this book John Bird introduces electrical principles and technology through examples rather than theory - enabling students to develop a sound understanding of the principles needed by technicians in fields such as electrical engineering, electronics and telecommunications. No previous background in engineering is assumed, making this an ideal...
Introduction to General Relativity
Introduction to General Relativity
A student-friendly style, over 100 illustrations, and numerous exercises are brought together in this textbook for advanced undergraduate and beginning graduate students in physics and mathematics. Lewis Ryder develops the theory of general relativity in detail. Covering the core topics of black holes, gravitational radiation, and cosmology, he...
JDBC Metadata, MySQL, and Oracle Recipes: A Problem-Solution Approach (Expert's Voice in Java)
JDBC Metadata, MySQL, and Oracle Recipes: A Problem-Solution Approach (Expert's Voice in Java)
This book focuses on database metadata (data about data) or annotation-based code recipes
for JDBC API for use with Oracle and MySQL. The book provides complete and working solutions
for performing database metadata tasks using JDBC. You can cut and paste solutions
from this book to build your own database metadata applications. All
...
Visual Basic 2005 Instant Results (Programmer to Programmer)
Visual Basic 2005 Instant Results (Programmer to Programmer)

Packed with unique, ready-to-use projects, this reference book will help you quickly get up to speed with Visual Basic 2005. Each project is presented in a step-by-step format, which enables you to set up, enhance, and reuse them in different real world situations.

Visual Basic 2005 Instant Results not only provides you with...

Red Hat Linux 9 Professional Secrets
Red Hat Linux 9 Professional Secrets
This ultimate under-the-hood guide to Red Hat Linux 9 takes the reader beyond obvious information about this complicated OS, revealing hidden features, tricks and alternate methods not easily found elsewhere.

It takes an expert to unlock the deepest secrets of Red Hat Linux 9–to show you what’s really under the hood and how
...
Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

CompTIA Security+ SY0-301 Authorized Cert Guide, Deluxe Edition (2nd Edition)
CompTIA Security+ SY0-301 Authorized Cert Guide, Deluxe Edition (2nd Edition)

Learn, prepare, and practice for CompTIA Security+ SY0-301exam success with this CompTIA Authorized Cert Guide, Deluxe Edition from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. DVD features three complete practice exams, complete video solutions to the 25...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy