Home | Amazing | Today | Tags | Publishers | Years | Search 
ESD in Silicon Integrated Circuits
ESD in Silicon Integrated Circuits

In the seven years since the first edition of this book was completed, Electrostatic Discharge (ESD) phenomena in integrated circuits (IC) continues to be important as technologies shrink and the speed and size of the chips increases. The phenomena related to ESD events in semiconductor devices take place outside the realm of normal device...

Dr. Atkins' New Diet Revolution
Dr. Atkins' New Diet Revolution

Weight loss, weight maintenance, good health and disease prevention through the Atkins nutritional approach.

Dr. Atkins' original Diet Revolution helped millions lose weight and maintain their weight loss for life. His sensational follow-up, Dr Atkins' New Diet Revolution, concentrated on total wellness in addition to...

Troubleshooting Windows 7 Inside Out: The ultimate, in-depth troubleshooting reference
Troubleshooting Windows 7 Inside Out: The ultimate, in-depth troubleshooting reference

You're beyond the basics, so dive right into troubleshooting Windows 7 -- and really put your PC to work! This supremely organized reference describes hundreds of prevention tips, troubleshooting techniques, and recovery tools in one essential guide. It's all muscle and no fluff. Discover how the experts keep their...

Breakthrough Discoveries in Information Technology Research: Advancing Trends
Breakthrough Discoveries in Information Technology Research: Advancing Trends

This collection, entitled Breakthrough Discoveries in Information Technology Research: Advancing Trends , aims to inform researchers and practitioners of novel and emerging research in information science and technology, allowing for the discussion and dissemination of critical concepts that will promote further study and innovation....

Epidemiology: A Very Short Introduction (Very Short Introductions)
Epidemiology: A Very Short Introduction (Very Short Introductions)

Epidemiology plays an all-important role in many areas of medicine, from discovering the relationship between tobacco smoking and lung cancer, to documenting the impact of diet, the environment, and exercise on general health, to tracking the origin and spread of new epidemics such as Swine Flu. It is truly a vital field, central to the...

Deploying Microsoft Forefront Threat Management Gateway 2010
Deploying Microsoft Forefront Threat Management Gateway 2010

When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG,...

Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance
Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance

This book is about expanding Internet business risk management strategies into resilience such as software diversity; into financial risk transfer instruments such as insurance policies, catastrophe bonds, performance bonds, and self-insurance as in Basel II; and into reputation systems.

Traditional Internet performance and...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy