Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Upgrading & Fixing PCs For Dummies
Upgrading & Fixing PCs For Dummies

Covers upgrades for gaming, digital video, and entertainment!

Transform your PC into a glitch-free, turbocharged, multimedia machine

Want to add punch to your PC? This handy reference helps add power to your old computer. Easy steps show you how to add memory, update your virus...

Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
Communications Technology Guide for Business (Artech House Telecommunications Library)
Communications Technology Guide for Business (Artech House Telecommunications Library)
This detailed guide for business managers describes communication technologies worldwide -- including the Internet and Web, digital mobile telephony, ISDN, SMDS, frame relay, and ATM -- and offers practical advice for selecting the most suitable technology for a particular business.

Written especially for non-technical managers in...

Metrics and Methods for Security Risk Management
Metrics and Methods for Security Risk Management

Metrics and Methods for Security Risk Management offers powerful analytic tools that have been absent from traditional security texts. This easy-to-read text provides a handy compendium of scientific principles that affect security threats, and establishes quantitative security metrics that facilitate the development of...

Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
OAuth 2.0 Identity and Access Management Patterns
OAuth 2.0 Identity and Access Management Patterns

Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.

Overview

  • Build web, client-side, desktop, and server-side...
Cyber Security and IT Infrastructure Protection
Cyber Security and IT Infrastructure Protection

This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and...

Ceramic Matrix Composites: Fiber Reinforced Ceramics and their Applications
Ceramic Matrix Composites: Fiber Reinforced Ceramics and their Applications
Ceramic Matrix Composites (CMCs) represent a relatively new class of quasiductile ceramic materials. They are characterized by carbon or ceramic fi bers embedded in ceramic matrices (oxide or non - oxide) with comparatively low bonding forces between the fi bers and the matrix. These weak intefaces, in combination with a porous...
Microsoft System Center 2012 Unleashed
Microsoft System Center 2012 Unleashed

This is the definitive real-world guide to Microsoft System Center 2012, Microsoft’s newest and most powerful version of System Center. Authored by consultants who’ve deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and...

Treatments from Toxins: The Therapeutic Potential of Clostridial Neurotoxins
Treatments from Toxins: The Therapeutic Potential of Clostridial Neurotoxins

As little as two decades ago, deliberately injecting botulinum toxin into patients would have seemed foolhardy at best and criminal at worst. The increased clinical use of botulinum toxins has expanded the body of knowledge available on the structure and function of these proteins. This knowledge can be applied to topics as varied as...

Handbook of Research on Public Information Technology
Handbook of Research on Public Information Technology
The use of information technology in the public sector has been an increasingly prominent international trend. With this rapid expansion comes many issues, challenges, and concerns relating to the application of public information technology.

The Handbook of Research of Public Information Technology compiles estimable research...

Environmental Justice and Sustainability in the Former Soviet Union (Urban and Industrial Environments)
Environmental Justice and Sustainability in the Former Soviet Union (Urban and Industrial Environments)

The legacy of environmental catastrophe in the states of the former Soviet Union includes desertification, pollution, and the toxic aftermath of industrial accidents, the most notorious of which was the Chernobyl disaster of 1986. This book examines the development of environmental activism in Russia and the former Soviet republics in response...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy