|
|
|
|
Security+ Study Guide, 2nd Edition (SYO-101)Here's the book you need to prepare for CompTIA's Security+ exam. This updated edition of the best-selling Security+ Study Guide was developed to meet the exacting requirements of today's certification candidates and aspiring IT security professionals. In addition to the consistent and accessible instructional... | | SCWCD Exam Study Kit Second Edition: Java Web Component Developer CertificationThis book is for Java programmers who want to prepare for the SCWCD exam, which focuses on the Servlet and JavaServer Pages technologies. This book will also be very useful for beginners since we have explained the concepts using simple examples. The text will bring you up to speed even if you are totally new to these technologies. Even expert... | | Realistic Architectural Visualization with 3ds Max and mental rayBring new realism to your visualizations with a command of the mental ray toolset in 3ds Max. mental ray is made simple with an accessible description of its tools and workflows. You can learn the nuts and bolts of applying materials, lighting, and optimizing your renders.
Step-by-step tutorials lavishly illustrate the processes and... |
|
|
The Official Guide for GMAT Review, 12th EditionThe Official Guide for GMAT Review, 12th Edition is the only book on the market written by the creators of the GMAT exam. Inside you’ll find more than 800 actual GMAT questions from previous tests with answers and detailed explanations. There’s also a grammar review, math review, actual essay topics, sample responses, and... | | History of Programming Languages (Acm Monograph Series)
These proceedings of the ACM SIGPLAN History of Programming Languages (HOPL) conference are a record, in the words of those who helped make the history, of a baker's dozen of the languages that set the tone of most of today's programming. It is difficult to describe the feeling that prevailed at the conference. There were no parallel... | | Breast Cancer Research Protocols (Methods in Molecular Medicine)
A collection of both well-established and cutting-edge methods for investigating breast cancer biology not only in the laboratory, but also in clinical settings. These readily reproducible techniques solve a variety of problems, ranging from how to collect, store, and prepare human breast tumor samples for analysis, to analyzing cells in vivo... |
|
| | | | Security Assessment: Case Studies for Implementing the NSA IAMThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... |
|
|
Result Page: 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 |