Home | Amazing | Today | Tags | Publishers | Years | Search 
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Financial Cryptography and Data Security: 11th International Conference, FC 2007, and First International Workshop on Usable Security
Financial Cryptography and Data Security: 11th International Conference, FC 2007, and First International Workshop on Usable Security
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, FC 2007, and the co-located 1st International Workshop on Usable Security, USEC 2007, both held in Scarborough, Trinidad/Tobago, in February 2007.

The book includes 17 revised full papers, 1 system...

E-Commerce: A Control and Security Guide
E-Commerce: A Control and Security Guide

Once scoffed at during the dot.com year, the formerly staid, old, “brick and mortar” companies have now fully recognized and implemented the value of the Internet. Their new online infrastructure allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and mortar” is now “brick and...

Essentials of Payroll: Management and Accounting
Essentials of Payroll: Management and Accounting

ESSENTIALS OF PAYROLL

Full of valuable tips, techniques, illustrative real-world examples, exhibits, and best practices, this handy and concise paperback will help you stay up to date on the newest thinking, strategies, developments, and technologies in payroll.

"Steven has done it again. Payroll...

Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Building on the success of its storefront and fulfillment services, Amazon now allows businesses to "rent" computing power, data storage and bandwidth on its vast network platform. This book demonstrates how developers working with small- to mid-sized companies can take advantage of Amazon Web Services (AWS) such as the Simple Storage...
From Program to Product: Turning Your Code into a Saleable Product
From Program to Product: Turning Your Code into a Saleable Product
Many would–be software entrepreneurs with expertise in many fields attempt to turn a homegrown application—one developed for use in their own business or profession—into a commercial product. Lack of knowledge, experience, or skills often prevents the idea from ever taking shape, let alone achieving its potential. Entering a new...
Information and Communication Technologies in Support of the Tourism Industry
Information and Communication Technologies in Support of the Tourism Industry
Tourism is one of the leading industries worldwide. The magnitude of growth in tourism will bring both opportunities and problems to source and destination markets in years to come, especially in the internal and external exchange of information in the industry. Information and Communication Technologies in Support of the Tourism Industry...
Engineering Wireless-Based Software Systems And Applications
Engineering Wireless-Based Software Systems And Applications
This comprehensive resource offers professionals detailed guidance on the engineering aspects of building software for wireless communications. From design and architecture to security and testing, the book shows how to overcome every engineering challenge encountered in successfully developing wireless software. Filled with open-source code...
M Commerce: Technologies, Services, and Business Models
M Commerce: Technologies, Services, and Business Models
Presenting the first book ever to provide a complete introduction to m-Commerce!

Mobile Commerce, or m-Commerce, is part of an explosion of new usage scenarios that overcome the limitations of mobile devices in support of highly personalized and time-critical activities for consumers and enterprises alike. With tens of millions
...
Electronic Commerce: Fundamentals & Applications
Electronic Commerce: Fundamentals & Applications
A comprehensive introduction to the underlying technologies of e-commerce. This book explores the full range of technologies, protocols, and techniques necessary for building successful e-commerce sites. The authors begin with an overview of the Internet and the Web, then quickly move on to explain server-side programming techniques, cryptography...
Mobile Business Strategies: Understanding the Technologies and Opportunities (Wireless Press)
Mobile Business Strategies: Understanding the Technologies and Opportunities (Wireless Press)
Mobile phones are no longer just a means of calling another person. In several countries, mobile devices are used to pay for merchandise, receive time sensitive information and send e-mail messages. Additionally, corporations use mobile phones to access critical business information and send tasks to field workers, regardless of time or...
Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
Mark Weisers vision of computers moving out of our focus of attention and becoming oblivious devices that occur in large numbers and provide smart computing und communication services to individuals as needed is still far from being reality.

This book puts the larger vision of ubiquitous computing in the context of todays mobile and distributed...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy