Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach...
Assessing Adolescent and Adult Intelligence, Third Edition
Assessing Adolescent and Adult Intelligence, Third Edition
The classic text—now updated with a new interpretive approach to the WAIS®-III

Assessing Adolescent and Adult Intelligence, the classic text from Alan Kaufman and Elizabeth Lichtenberger, has consistently provided the most comprehensive source of information on cognitive assessment of adults and adolescents. The newly updated Third...

Adobe Photoshop for VFX Artists
Adobe Photoshop for VFX Artists
Adobe Photoshop for VFX Artists is an in-depth guide to creating visual effects art using Photoshop. Taking a straightforward, visual approach to Adobe's best-selling software, this book provides you with everything you need to use Photoshop to meet specific goals for art creation. Develop the skills you need to master professional matte painting...
AMA Handbook of E-Learning, The: Effective Design, Implementation, and Technology Solutions
AMA Handbook of E-Learning, The: Effective Design, Implementation, and Technology Solutions
This authoritative sourcebook is a timely decision-making tool for companies making the transition to (or already using) e-learning. Featuring all-original contributions from high-profile practitioners and renowned theorists, the book reveals how top companies are implementing and using this crucial employee development tool. Topics include:

*...

Sams Teach Yourself WordPress 3 in 10 Minutes (Sams Teach Yourself -- Minutes)
Sams Teach Yourself WordPress 3 in 10 Minutes (Sams Teach Yourself -- Minutes)

Blogging has been booming for years, and it shows no sign of slowing down. It is an easy and organized way to deliver news, tutorials, and podcasts;it’s even an easy way to share personal thoughts and stories. It was the social network before other social networks existed. Like blogging, WordPress has grown over the years to a mature...

Microsoft  VBScript Step by Step
Microsoft VBScript Step by Step
Learn how to automate Windows administration step by step with hands-on instruction from a leading Microsoft Visual Basic Scripting Edition (VBScript) trainer. This guide features self-paced labs, timesaving tips, and more than 100 sample scripts.

Network administrators and consultants are confronted with numerous mundane...

Microsoft Office 2003 in 10 Simple Steps or Less
Microsoft Office 2003 in 10 Simple Steps or Less
If you are looking to perform specific activities in Microsoft Office 2003 fast, then this book is for you–whether you’re new to Microsoft Office or you’re just upgrading to the 2003 version. This comprehensive guide delivers the answers you need with clear, easy-to-follow instructions for more than 250 key Microsoft Office 2003...
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!" -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious...
Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)
Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)

Excuse me, but who are you, exactly?

You are a father or mother, a son or daughter, husband or wife, a significant other, a rock climber, a kite-flyer, a bicycle enthusiast, a marathon runner, a collector of old movies, a secret novelist, a boxing fan. You are the center of your universe. On the picture collage from the...

Google Guice: Agile Lightweight Dependency Injection Framework (Firstpress)
Google Guice: Agile Lightweight Dependency Injection Framework (Firstpress)
Guice (pronounced “Juice”) is the Jolt Award winning, 100% Java icing on the cake of Java dependency injection. Unlike other popular DI frameworks such as Spring, Guice fully embraces modern Java language features and combines simplicity with stunning performance and developer–friendliness.

Google Guice: Agile Lightweight...

Microsoft Dynamics CRM 2013 Marketing Automation
Microsoft Dynamics CRM 2013 Marketing Automation

Implement effective marketing strategies using Microsoft Dynamics CRM 2013

Overview

  • Hands-on and illustration focussed guide for beginners and expert marketers.
  • Detailed features of marketplace solutions explained to help marketers understand advanced email marketing concepts and capture...
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy