Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security for Non-Techies
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security for Non-Techies
Fully updated and expanded!
  • Added steps for Windows 10 and Mac OS X El Capitan
  • Over 30% more material
  • Expanded coverage on mobile device safety
  • Expanded coverage on safety for kids online
Contains well over 100 tips with complete step-by-step
...
Mobile Forensics: Advanced Investigative Strategies
Mobile Forensics: Advanced Investigative Strategies

Key Features

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career...
Digital Addiction: Breaking Free from the Shackles of the Internet, TV and Social Media
Digital Addiction: Breaking Free from the Shackles of the Internet, TV and Social Media

Digital addiction is a very real threat.


Find freedom today and get addiction treatment for video game addiction, technology addiction, cell phone addiction, internet addiction, and social media addiction with this powerful book!

Do you find yourself struggling to break free from TV,...

Samsung Galaxy S7 For Dummies (For Dummies (Computer/tech))
Samsung Galaxy S7 For Dummies (For Dummies (Computer/tech))
Your fun and accessible user's guide to the Samsung Galaxy S 7

Technology alone can be intimidating, and the printed documentation and online support that come with a new smartphone can be just as baffling. Thankfully, Samsung Galaxy S 7 For Dummies is here to give you easy-to-follow guidance on all the features...

Prime Numbers: The Most Mysterious Figures in Math
Prime Numbers: The Most Mysterious Figures in Math

A fascinating journey into the mind-bending world of prime numbers

Cicadas of the genus Magicicada appear once every 7, 13, or 17 years. Is it just a coincidence that these are all prime numbers? How do twin primes differ from cousin primes, and what on earth (or in the mind of a mathematician) could be sexy about prime numbers?
...

Mastering OpenCV Android Application Programming
Mastering OpenCV Android Application Programming

Master the art of implementing computer vision algorithms on Android platforms to build robust and efficient applications

About This Book

  • Understand and utilise the features of OpenCV, Android SDK, and OpenGL
  • Detect and track specific objects in a video using Optical Flow and Lucas Kanade...
Optimized C++: Proven Techniques for Heightened Performance
Optimized C++: Proven Techniques for Heightened Performance

In today’s fast and competitive world, a program’s performance is just as important to customers as the features it provides. This practical guide teaches developers performance-tuning principles that enable optimization in C++. You’ll learn how to make code that already embodies best practices of C++ design run...

iOS 4 in Action: Examples and Solutions for iPhone & iPad
iOS 4 in Action: Examples and Solutions for iPhone & iPad

When I started playing with the first-generation iPhone back in 2008, I was amazed by the simplicity and versatility of the smart phone. With the iPhone in hand, I could take pictures, navigate with GPS, tell time, and of course, play games—especially when I was bored while waiting in line at the DMV for my license plate....

Cloud Computing Bible
Cloud Computing Bible

In the five months that I have been researching and writing Cloud Computing Bible, it has become clear to me that most people recognize that cloud computing is a big deal, even if they are not really clear why that is so. Every day newspaper and magazine articles and radio and TV stories report on cloud computing. The phrase “in the...

Introduction to Contextual Processing: Theory and Applications
Introduction to Contextual Processing: Theory and Applications

Contextual computing has been around for several years with a variety of names such as pervasive computation and omnipresent computing. Recently there has been a drive toward making personal digital assistants (PDAs) more aware of their environment. For example, a cell phone may sense that it is in a conference room and reason that it should...

Agile Business Rule Development: Process, Architecture, and JRules Examples
Agile Business Rule Development: Process, Architecture, and JRules Examples

According to Wordnet, a rule is “a principle or condition that customarily governs behavior” or “a prescribed guide for conduct or action.” Businesses, and organizations in general, operate under a number of rules: rules about what services to offer and to whom; rules about how much to charge for those services;...

Computer Privacy Annoyances
Computer Privacy Annoyances

From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances...

Result Page: 54 53 52 51 50 49 48 47 46 45 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy