Home | Amazing | Today | Tags | Publishers | Years | Search 
Pervasive Computing and Networking
Pervasive Computing and Networking

This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks

With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future,...

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

iOS 6 Programming Cookbook
iOS 6 Programming Cookbook
The long-awaited iOS 6 SDK (Software Development Kit) is finally out, and we need to learn about all the great features that this release offers us. Apple did a great job adding new features to the SDK and, of course, to iOS itself. iOS 6 is much more stable than the previous versions of iOS, as you would expect....
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
HTML5 Video How-To
HTML5 Video How-To
Are you looking to host the next mini blockbuster video from your website? Do you want it to be accessible in most modern browsers, without the need for lots of extra plugins, or extra code?

If the answer to the above two questions is yes, then enter HTML5 Video—created as the new way to show video online in
...
Yammer Starter
Yammer Starter
Welcome to the Yammer Starter. This book has been especially created to provide you with all the information that you need to get set up with Yammer. You will learn the basics of Yammer, get started with building your profile, and discover some tips and tricks for using Yammer.

A concise, enjoyable look at using Yammer, the...

WordPress Bible
WordPress Bible

Get the latest word on the biggest self-hosted blogging tool on the market

Within a week of the announcement of WordPress 3.0, it had been downloaded over a million times. Now you can get on the bandwagon of this popular open-source blogging tool with WordPress Bible, 2nd Edition. Whether you're a casual blogger or...

NumPy Cookbook
NumPy Cookbook
We, NumPy users, live in exciting times. New NumPy-related developments seem to come to our attention every week or maybe even daily. When this book was being written, NumPy Foundation of Open Code for Usable Science was created. The Numba project—NumPy-aware, dynamic Python compiler using LLVM—was announced. Also,...
OS X Mountain Lion Server For Dummies
OS X Mountain Lion Server For Dummies

Create a Mac network in your home or office

There's no doubt about it: Macs, iPhones, and iPads have invaded the workplace. But, you don't need an IT department to administer a Mac network in your home or business. This friendly guide explains everything you need to know to set one up yourself using OS X Mountain...

Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Testing of Genetically Modified Organisms in Foods
Testing of Genetically Modified Organisms in Foods

Examine several methods of testing for genetically modified organisms and the reasons behind their strict regulation!

Testing of Genetically Modified Organisms in Foods is the first study of the screening methods and tools utilized for determining the presence of genetically modified organisms (GMOs) in food products. Leading
...

Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy