Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro PayPal E-Commerce (Expert's Voice)
Pro PayPal E-Commerce (Expert's Voice)
Pro PayPal E-Commerce contains the most comprehensive collection of information on the latest PayPal technologies available. It takes the approach of PayPal as a digital money platform, and shows how it's a dynamic service that offers far more than just payment processing.

With its breadth of technologies and APIs, the PayPal platform...

Safety Design for Space Systems
Safety Design for Space Systems
Progress in space safety lies in the acceptance of safety design and engineering as an integral part of the design and implementation process for new space systems. Safety must be seen as the principle design driver of utmost importance from the outset of the design process, which is only achieved through a culture change that moves all...
Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)
Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)

Data mining has developed rapidly and has become very popular in the past two decades, but actually has its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases. The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In corporate...

Resistance, Liberation Technology and Human Rights in the Digital Age (Law, Governance and Technology Series)
Resistance, Liberation Technology and Human Rights in the Digital Age (Law, Governance and Technology Series)

This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference...

Home Blood Pressure Monitoring (Updates in Hypertension and Cardiovascular Protection)
Home Blood Pressure Monitoring (Updates in Hypertension and Cardiovascular Protection)

Hypertension remains a leading cause of disability and death worldwide. Self-monitoring of blood pressure by patients at home is currently recommended as a valuable tool for the diagnosis and management of hypertension. Unfortunately, in clinical practice, home blood pressure monitoring is often inadequately implemented, mostly due...

Power System Relaying
Power System Relaying

With emphasis on power system protection from the network operator perspective, this classic textbook explains the fundamentals of relaying and power system phenomena including stability, protection and reliability. The fourth edition brings coverage up-to-date with important advancements in protective relaying due to significant changes in...

2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects
...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World
Controlling Knowledge: Freedom of Information and Privacy Protection in a Networked World

Digital communications technology has immeasurably enhanced our capacity to store, retrieve, and exchange information. But who controls our access to information, and who decides what others have a right to know about us? In Controlling Knowledge, author Lorna Stefanick offers a thought-provoking and eminently user-friendly overview of...

Microsoft System Center Data Protection Manager 2012 SP1
Microsoft System Center Data Protection Manager 2012 SP1

Written by a team of Microsoft System Center Most Valued Professionals (MVPs), this is the ultimate guide to using Data Protection Management (DPM) to safeguard your organization's valuable information. Packed with tips and real-life solutions.

Overview

  • Practical guidance that will help you get the...
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
LGBTI Asylum Seekers and Refugees from a Legal and Political Perspective: Persecution, Asylum and Integration
LGBTI Asylum Seekers and Refugees from a Legal and Political Perspective: Persecution, Asylum and Integration
This book addresses the ‘three moments’ in lesbian, gay, bisexual, transgender and intersex (LGBTI) asylum seekers’ and refugees’ efforts to secure protection: The reasons for their flight, the Refugee Status Determination process, and their integration into the host community once they are recognized refugee...
unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy