Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)
Sams Teach Yourself Facebook in 10 Minutes (2nd Edition)

With more than 400 million active users and growing, it’s hard to ignore the buzz about Facebook. It’s a hot topic these days, and shows no signs of letting up. If you’re ready to get to the bottom of this Internet sensation and find out how to use this social networking phenomenon for yourself,...

Auditor's Guide to Information Systems Auditing
Auditor's Guide to Information Systems Auditing

Praise for Auditor′s Guide to Information Systems Auditing

"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what...

Facebook: The Missing Manual (Missing Manuals)
Facebook: The Missing Manual (Missing Manuals)

Facebook's spreading about as far and fast as the Web itself: 500 million members and counting. But there's a world of fun packed into the site that most folks miss. With this bestselling guide, learn how to unlock Facebook's talents as personal website creator, souped-up address book, and bustling community forum....

Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science)
Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science)
Inference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, is about finding tradeoffs to the tension between the increasing societal need for accurate statistical data and the legal and ethical obligation to protect privacy of individuals and enterprises which are the source...
Fatal Exit: The Automotive Black Box Debate
Fatal Exit: The Automotive Black Box Debate
A compelling argument for automotive technologies that speak for the victim, tell the truth, and could save millions of lives

Fatal Exit: The Automotive Black Box Debate cuts through thirty years of political wrangling and institutional biases to provide an argument for the Motor Vehicle Event Data Recorder (MVEDR). This automotive equivalent...

Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
In many ways, Google is the prototype of a successful twenty-first-century company. It uses technology in new ways to make information universally accessible; promotes a corporate culture that encourages creativity among its employees; and takes its role as a corporate citizen very seriously, investing in green initiatives and developing the...
Unit and Ubiquitous Internet of Things
Unit and Ubiquitous Internet of Things

Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.

Answering fundamental questions about IoT architectures and models, Unit and Ubiquitous
...

Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

The Web Testing Companion: The Insider's Guide to Efficient and Effective Tests
The Web Testing Companion: The Insider's Guide to Efficient and Effective Tests
Practical, hands-on techniques for testing the design, globalization, performance, and security of Web applications

Whether you’re a novice or experienced Web tester, this hands-on guide provides you with the practical steps you’ll need to follow to rigorously test across multiple platforms and browsers. Written by one of...

Handbook of Database Security: Applications and Trends
Handbook of Database Security: Applications and Trends
Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of...
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy