Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box is a unique book in the fiction department.
It combines stories that are fictional with technology that is real.While
none of these specific events have happened, there is no reason why they could
not.You could argue it provides a roadmap for criminal hackers, but I say it does
something
...
Microsoft SQL Server 2005 Integration Services
Microsoft SQL Server 2005 Integration Services

All medium to large companies have to deal with data being stored in a number of databases, spreadsheets and proprietary applications. Bringing all this data together into one system can be useful to analyzing the business; but can also be quite difficult to do. Integration Services is the next...

Macintosh Switcher's Guide (Wordware Macintosh Library)
Macintosh Switcher's Guide (Wordware Macintosh Library)
Maybe you saw the Switcher advertisements on television or the
web. Maybe you were drawn into an Apple Store by the beautiful
machine in the display. Maybe you’ve always thought a little differently,
or wanted something a little different for a change.
Whatever the reason for your switch to Macintosh, here you are....
Integration of ICT in Smart Organizations
Integration of ICT in Smart Organizations
The production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production...
Lightwave 3D Character Animation
Lightwave 3D Character Animation
This book is for anyone who has ever had a character in their heart that they’ve wanted to bring to life with as much fluidity, power, and grace as can be seen in the best animated feature films. This is a book for anyone who has wanted to become an animator but hasn’t gone to Sheridan College in Toronto or CalArts in Valencia. This is...
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

The Best Damn IT Security Management Book Period
The Best Damn IT Security Management Book Period
This chapter will address vulnerabilities and why they are important. It also discusses a concept known as Windows of Vulnerability, and shows how to determine the risk a given vulnerability poses to your environment.

What Are Vulnerabilities?

So, what are
...
Influence: Gaining Commitment, Getting Results (Center for Creative Leadership)
Influence: Gaining Commitment, Getting Results (Center for Creative Leadership)

Influence is an essential component of leadership. Your position in an organization and the power it gives you aren’t always enough to motivate people to do what you ask. Developing your influence skills can help you gain commitment from people at all levels: direct reports, peers, and bosses.

This book includes an assessment tool...

New Trends in Software Process Modelling (Software Engineering and Knowledge Engineering)
New Trends in Software Process Modelling (Software Engineering and Knowledge Engineering)
Over the years, a variety of software process models have been designed to structure, describe and prescribe the software systems construction process. More recently, software process modelling is increasingly dealing with new challenges raised by the tests that the software industry has to face. This book addresses these new trends in software...
The Economics of Open Source Software Development
The Economics of Open Source Software Development
Open Source Software (OSS) development appears to present a stark contrast to traditional production and innovation methods and an unlikely contestant in the marketplace. Some of the most striking features are that OSS development is based on contributions of volunteer programmers, that these programmers only associated with each other through...
Accessible Technology in Today's Business (Cpg-Other)
Accessible Technology in Today's Business (Cpg-Other)
Microsoft is dedicated to developing technology that is useable and accessible to all. In ACCESSIBLE TECHNOLOGY IN TODAY'S BUSINESS, business managers discover how to utilize the built-in accessibility features in Microsoft products to meet the needs and preferences of people with disabilities. The book identifies the assistive technology features...
Ubuntu 8.10 Linux Bible
Ubuntu 8.10 Linux Bible
A Linux distribution is basically the sum of the things that you need to run Linux on your computer. There are many different Linux distributions, each with its own target audience, set of features, administrative tools, and fan club, the latter of which is more properly known as a user community. Putting aside the downright fanatics, most of the...
unlimited object storage image
Result Page: 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy