Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Raising Capital: Get The Money You Need To Grow Your Business
Raising Capital: Get The Money You Need To Grow Your Business
Whether your business is just a gleam in your eye, a newly launched operation, or a full-fledged firm that's humming right along, you'll never experience real growth without a substantial infusion of cash. Long gone are the days when venture capital groups seemed to pour millions into every "next big thing." Now it's clear that there is...
NetBeans(TM) IDE Field Guide: Developing Desktop, Web, Enterprise, and Mobile Applications (2nd Edition)
NetBeans(TM) IDE Field Guide: Developing Desktop, Web, Enterprise, and Mobile Applications (2nd Edition)

The Only Complete Guide and Reference for NetBeans™ IDE 5.0

The award-winning NetBeans™ IDE eases all aspects of Java application development, incorporating a wide range of powerful features into one well-designed package. NetBeans IDE is consistently first in supporting the latest Java technologies for...

Navigating Social Media Legal Risks: Safeguarding Your Business (Que Biz-Tech)
Navigating Social Media Legal Risks: Safeguarding Your Business (Que Biz-Tech)

The plain-English business guide to avoiding social media legal risks and liabilities—for anyone using social media for business—written specifically for non-attorneys!

You already know social media can help you find customers, strengthen relationships, and build your...

Diet Diversification and Health Promotion: European Academy of Nutritional Sciences (EANS) Conference, Vienna, May 2004 (Forum of Nutrition, Vol. 57)
Diet Diversification and Health Promotion: European Academy of Nutritional Sciences (EANS) Conference, Vienna, May 2004 (Forum of Nutrition, Vol. 57)

About half of the global burden of disease is due to chronic noncommunicable diseases such as obesity, metabolic disorders, cardiovascular diseases and cancer, which are all related to modifiable risk factors such as unbalanced diet and malnutrition as well as determinants such as behavior and lifestyle. Dietary patterns during the last few...

Wireless J2ME Platform Programming
Wireless J2ME Platform Programming

The authoritative tutorial for wireless J2ME application developers.

  • The essential tutorial for every J2ME platform developer: no wireless experience necessary
  • Complete coverage of architecture, design, coding, debugging, and deployment
  • Advanced topics include-persistent storage, networking,...
Richard Dawkins: How a Scientist Changed the Way We Think: Reflections by Scientists, Writers, and Philosophers
Richard Dawkins: How a Scientist Changed the Way We Think: Reflections by Scientists, Writers, and Philosophers
"A vivid picture of how one man, by force of rigorous analysis and clear writing, taught a generation of biologists how to think about evolution."--New York Times

ith the publication of the international bestseller The Selfish Gene some thirty years ago, Richard Dawkins powerfully captured a newly emerging way of
...
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web

Privacy is a basic human need, and losing privacy is perceived as an extremely threatening experience. Privacy embraces solitude, personal space, or intimacy with family and friends and as such, it is a ubiquitous and trans-cultural phenomenon. Privacy leverages well-being; without privacy we are at risk of becoming physically or...

Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Pro Android Apps Performance Optimization (Professional Apress)
Pro Android Apps Performance Optimization (Professional Apress)
Android quickly became almost ubiquitous. With the world transitioning from feature phones to smartphones, and then discovering that tablets are, after all, devices we can hardly live without, application developers today have a choice between mostly two platforms: Android and iOS. Android lowered, some may even say broke, the...
Company of One: Why Staying Small Is the Next Big Thing for Business
Company of One: Why Staying Small Is the Next Big Thing for Business
What if the real key to a richer and more fulfilling career was not to create and scale a new start-up, but rather, to be able to work for yourself, determine your own hours, and become a (highly profitable) and sustainable company of one? Suppose the better—and smarter—solution is simply to remain small? This book...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy