Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The E-Privacy Imperative : Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age
The E-Privacy Imperative : Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age
With their potential for vicious customer backlash and devastating sales drops, Internet privacy infractions--such as selling e-mail lists and personal data or operating an insecure site where credit-card or competitive-pricing information can be stolen--have become deadly serious business concerns.

The E-Privacy Imperative is...

Outlook 2007 All-in-One Desk Reference For Dummies (Computer/Tech)
Outlook 2007 All-in-One Desk Reference For Dummies (Computer/Tech)
10 books in 1 — your key to success with Outlook 2007!

Your one-stop guide to managing e-mail, contacts, and schedules with Outlook

Ten handy minibooks show you all the tricks for setting up your e-mail account and sending e-mails; receiving news feeds; sending instant messages;...

Official Red Hat Linux User's Guide
Official Red Hat Linux User's Guide

Red Hat sealed and approved! Compiled by Red Hat’s own documentation team and reviewed by a Red Hat qualified technical expert, this comprehensive, authoritative guide delivers all the know-how you need to install, use, and customize the latest version of Red Hat Linux.

From identifying system requirements to configuring a network,...

Multitool Linux: Practical Uses for Open Source Software
Multitool Linux: Practical Uses for Open Source Software

This resource-packed guide delivers pragmatic solutions for real-world Linux development needs—all using open-source software tools. Viewing Linux as a well-stocked toolbox, Multitool Linux shows programmers and sophisticated users how to create a wide variety of exciting and useful applications for business and...

Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...

MCSE Self-Paced Training Kit (Exam 70-294): Planning, Implementing, and Maintaining a MS Windows Server 2003 AD Infrastructure, Second Edition
MCSE Self-Paced Training Kit (Exam 70-294): Planning, Implementing, and Maintaining a MS Windows Server 2003 AD Infrastructure, Second Edition
Get in-depth exam preparation for the updated Exam 70-294, a core MCSA/MCSE exam for Windows Server 2003-and build real-world job skills. Includes case studies, troubleshooting labs, and more.

Active Directory directory service provides a single point of network resource management, allowing you to add, remove, and relocate users and
...
User-centered Design of Online Learning Communities
User-centered Design of Online Learning Communities
This collection makes a valuable contribution to the already large literature of online learning communities. The 16 chapters come from diverse international sources, but they are satisfyingly narrow in their focus on user-centered design, analysis, and evaluation.

The opening chapter provides a role model for what follows: good reviews
...
The Rights of Public Employees, Second Edition: The Basic ACLU Guide to the Rights of Public Employees (ACLU Handbook)
The Rights of Public Employees, Second Edition: The Basic ACLU Guide to the Rights of Public Employees (ACLU Handbook)

In this revised and updated edition of The Rights of Public Employees, Robert M. O’Neil broadens the focus from government employees to all public employees, emphasizing the public-service nature of the occupations and professions of such individuals. Using a question-and-answer format, O’Neil covers such topics as...

Advances in Biometrics: Sensors, Algorithms and Systems
Advances in Biometrics: Sensors, Algorithms and Systems

Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets of modern society. From simply logging on to a laptop to crossing the border of a country, biometrics is being called upon to meet the growing challenges of identity management.

With contributions from academia and...

Location-Aware Applications
Location-Aware Applications

Summary

Location-Aware Applications is a comprehensive guide to the technology and business of creating compelling location-based services and applications. The book walks you through the LBS landscape, from mapping technologies to available platforms; from toolkits to business questions like monetization...

Privacy in Social Networks (Synthesis Lecutres on Data Mining and Knowledge Discovery)
Privacy in Social Networks (Synthesis Lecutres on Data Mining and Knowledge Discovery)

This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and...

Word 2003 Bible
Word 2003 Bible
If Word 2003 can do it, you can do it too...

If you work in an office or own a computer you’ve probably used Word, but do you know all it can do? This comprehensive reference covers the basics for beginners and then charges right into the impressive new features of Word 2003. Discover the power of automated fields using Smart Tags, learn...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy