Home | Amazing | Today | Tags | Publishers | Years | Search 
Internet Simplified
Internet Simplified
The content boom on the Internet has been explosive in the past few years with more than a billion people surfing worldwide. Internet Simplified shows beginning level computer users how to get comfortable surfing the web and how to navigate the flood of information once they find what they're looking for. Users will find helpful information on the...
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking and authoritative resource, Human-Computer Interaction Fundamentals emphasizes...
Creating Facebook applications - 100 Success Secrets to creating Awesome Facebook Applications and leverage Social Media
Creating Facebook applications - 100 Success Secrets to creating Awesome Facebook Applications and leverage Social Media
Facebook is a very popular social networking site. There are millions of users who have joined this site for a good number of reasons: to stay in touch, create new relationships and interact with one another. The last reason is probably the most important reason of all – which is why so many Facebook application companies have decided to...
Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
Autonomic Computing and Networking
Autonomic Computing and Networking
Autonomic Computing and Networking presents introductory and advanced topics on autonomic computing and networking with emphasis on architectures, protocols, services, privacy & security, simulation and implementation testbeds. Autonomic computing and networking are new computing and networking paradigms that allow the creation of self-managing...
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community.

Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by...

Enterprise Recipes with Ruby and Rails
Enterprise Recipes with Ruby and Rails
Enterprise Recipes with Ruby and Rails helps you to overcome typical obstacles hidden in every enterprise's infrastructure. It doesn't matter if your Rails application needs to access your company's message-oriented middleware or if it has to scan through tons of huge XML documents to get a missing piece of data. Ruby and Rails enable you...
Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
In many ways, Google is the prototype of a successful twenty-first-century company. It uses technology in new ways to make information universally accessible; promotes a corporate culture that encourages creativity among its employees; and takes its role as a corporate citizen very seriously, investing in green initiatives and developing the...
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier

"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,...

Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
This is the first comprehensive text to cover this fascinating field from origins to present-day practices. Secret agents are no longer the only people using spycams, radio beacons, and tiny audio listening devices called 'bugs.' Spy devices are now an important part of almost every investigation, office environment, phone system, traffic...
Sams Teach Yourself Facebook in 10 Minutes
Sams Teach Yourself Facebook in 10 Minutes

Sams Teach Yourself Facebook in 10 Minutes offers straightforward, practical answers

when you need fast results. By working through 10-minute lessons, you’ll learn everything you

need to know to quickly and easily get up to speed with Facebook.

...
Services and Business Computing Solutions With Xml: Applications for Quality Management and Best Processes
Services and Business Computing Solutions With Xml: Applications for Quality Management and Best Processes
Commercial systems built today are increasingly using XML technologies for storing any amount of text or data.

Services and Business Computing Solutions with XML: Applications for Quality Management and Best Processes collects the latest research for academicians and practitioners that describes the use and synergy between...

Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy