Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile Marketing: Finding Your Customers No Matter Where They Are
Mobile Marketing: Finding Your Customers No Matter Where They Are

I believe that mobile marketing is the marketing of the future. My name is Cindy Krum, and I am the author of Mobile Marketing: Finding Your Customers No Matter Where They Are. This book is intended to be a comprehensive guide for marketers and anyone who wants a clearer understanding of how they can integrate mobile marketing with their...

Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step...

Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity

Key Features

  • Understand the concept of Dark Net and Deep Web
  • Use Tor to extract data and maintain anonymity
  • Develop a security framework using Deep web evidences
  • ...
5G-Enabled Vehicular Communications and Networking (Wireless Networks)
5G-Enabled Vehicular Communications and Networking (Wireless Networks)

This book investigates and reviews recent advanced techniques and important applications in vehicular communications and networking (VCN) from a novel perspective of the combination and integration of VCN and connected vehicles, which provides a significant scientific and technical support for future 5G-based...

Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.

Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the...

Services and Business Computing Solutions With Xml: Applications for Quality Management and Best Processes
Services and Business Computing Solutions With Xml: Applications for Quality Management and Best Processes
Commercial systems built today are increasingly using XML technologies for storing any amount of text or data.

Services and Business Computing Solutions with XML: Applications for Quality Management and Best Processes collects the latest research for academicians and practitioners that describes the use and synergy between...

Ethics: The Heart of Health Care
Ethics: The Heart of Health Care

Ethics: The Heart of Health Care — a classic ethics text in medical, health and nursing studies — is recommended around the globe for its straightforward introduction to ethical analysis. In this Third Edition David Seedhouse again demonstrates tangibly and graphically how ethics and health care are inextricably...

Professional Blogging For Dummies
Professional Blogging For Dummies

Take your hobby to the next level and turn your blog into real income

Anyone who blogs knows that it is a fun, creative way for sharing thoughts and opinions. Now imagine making money from that hobby! This practical, how-to guide shows you how you can get serious about using your blog and implement advertising, sponsorship,...

Dart in Action
Dart in Action

Summary

Dart in Action introduces Google's Dart language and provides techniques and examples showing how to use it as a viable replacement for Java and JavaScript in browser-based desktop and mobile applications. It begins with a rapid overview of Dart language and tools, including features like...

iOS Application Security: The Definitive Guide for Hackers and Developers
iOS Application Security: The Definitive Guide for Hackers and Developers
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them.

After a crash course
...
Microsoft Windows Vista Unleashed (2nd Edition)
Microsoft Windows Vista Unleashed (2nd Edition)
Microsoft Windows Vista Unleashed, Second Edition, is a book for people, like you, who don’t consider themselves to be “average users.” It’s a book for anyone who finds that doing things the official way is slower, less efficient, and less powerful because Windows Vista was designed from the ground up to avoid...
unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy