Home | Amazing | Today | Tags | Publishers | Years | Search 
CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

Pro Tools 101 Official Courseware, Version 8 (Artistpro)
Pro Tools 101 Official Courseware, Version 8 (Artistpro)

Digidesign’s Official Pro Tools 101 Courseware takes a comprehensive approach to learning the fundamentals of Pro Tools|HD®, Pro Tools LE®, or Pro Tools M-Powered™ systems. Now updated for Pro Tools 8 software, this new edition from the definitive authority on Pro Tools covers everything you need to know to complete a Pro...

C# 4.0 in a Nutshell: The Definitive Reference
C# 4.0 in a Nutshell: The Definitive Reference

What people are saying about C# 4.0 in a Nutshell

"C# 4.0 in a Nutshell is one of the few books I keep on my desk as a quick reference. It is a book I recommend." --Scott Guthrie, Corporate Vice President, .NET Developer Platform, Microsoft Corporation

"A must-read for a concise...

Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

Microsoft Windows 7 Unleashed
Microsoft Windows 7 Unleashed

Covers Release Candidate of Windows 7. 

With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.

 

Microsoft® Windows 7 Unleashed...

Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management
Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management

Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies...

Java 2 for Dummies
Java 2 for Dummies

* This updated bestseller covers programming essentials for the newest version of Java, the popular platform-independent, object-oriented programming language
* The material is fully updated and focuses on the new Java SDK 1.5, addressing the needs of new or inexperienced Java developers
* The fun and easy writing style walks
...

Foundations of Knowledge Acquisition:: Machine Learning (The International Series in Engineering and Computer Science)
Foundations of Knowledge Acquisition:: Machine Learning (The International Series in Engineering and Computer Science)
The two volumes of Foundations of Knowledge Acquisition document the recent progress of basic research in knowledge acquisition sponsored by the Office of Naval Research. This volume is subtitled Machine Learning, and there is a companion volume subtitled Cognitive Models of Complex Learning. Funding was provided by a five-year Accelerated...
The Never Cold Call Again Online Playbook: The Definitive Guide to Internet Marketing Success
The Never Cold Call Again Online Playbook: The Definitive Guide to Internet Marketing Success

An all-in-one guide to online marketing from the New York Times bestselling author of Never Cold Call Again

In Never Cold Call Again, Frank Rumbauskas shows salespeople how to achieve sales greatness without using those dreaded old tactics like cold calling. Now, in The Never Cold Call Again Online...

The Pocket Handbook of Image Processing Algorithms In C
The Pocket Handbook of Image Processing Algorithms In C
This handy desktop reference gathers together into one easy-to-use volume the most popular image processing algorithms. Designed to be used at the computer terminal, it features an illustrated, annotated dictionary format — with clear, concise definitions, examples, and C program code. Covers algorithms for adaptive filters, coding and...
Expert SQL Server 2008 Development
Expert SQL Server 2008 Development

Expert SQL Server 2008 Development is aimed at SQL Server developers ready to move beyond Books Online. Author and experienced developer Alastair Aitchison shows you how to think about SQL Server development as if it were any other type of development. You’ll learn to manage testing in SQL Server and to properly...

Clinical Data-Mining: Integrating Practice and Research (Pocket Guides to Social Work Research Methods)
Clinical Data-Mining: Integrating Practice and Research (Pocket Guides to Social Work Research Methods)

Clinical Data-Mining (CDM) involves the conceptualization, extraction, analysis, and interpretation of available clinical data for practice knowledge-building, clinical decision-making and practitioner reflection. Depending upon the type of data mined, CDM can be qualitative or quantitative; it is generally retrospective, but may be...

Result Page: 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy