Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Encyclopedia of Virtual Communities and Technologies
Encyclopedia of Virtual Communities and Technologies
Advances in computer and telecommunications technologies during the past several decades, have facilitated the creation of virtual communities and organizations throughout the world. As the growth in virtual communities accelerates, researchers are facing new challenges to learn about the latest of research and practices in this fast growing filed....
Web Security, Privacy and Commerce, 2nd Edition
Web Security, Privacy and Commerce, 2nd Edition
The World Wide Web has changed our world. More than half the people in the United States now use the Web on a regular basis. We use it to read today's news, to check tomorrow's weather, and to search for events that have happened in the distant past. And increasingly, the Web is the focus of the 21st century...
Network Protocols Handbook
Network Protocols Handbook
We are living in the IT(Information Technologies) times. The IT provides us many powerful tools that have significantly changed our way of life, work and business operations. Among all the IT advancements, Internet has the most impact in every aspect of our society for the past 20 years. From Internet, people can get instant news, communicate with...
Introducing Windows Server 2012
Introducing Windows Server 2012
Windows Server 2012 is probably the most significant release of the Windows Server platform ever. With an innovative new user interface, powerful new management tools, enhanced Windows PowerShell support, and hundreds of new features in the areas of networking, storage, and virtualization, Windows Server 2012...
Web Search: Public Searching of the Web (Information Science and Knowledge Management)
Web Search: Public Searching of the Web (Information Science and Knowledge Management)

Web Search: Public Searching of the Web, co-authored by Drs. Amanda Spink and Bernard J. Jansen, is one of the first manuscripts that address the human - system interaction of Web searching in a thorough and complete manner. The authors provide an examination of Web searching from multiple levels of analysis, from theoretical...

Cryptanalytic Attacks on RSA
Cryptanalytic Attacks on RSA
RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science....
Geographic Information Systems and Science
Geographic Information Systems and Science

Geographic Information Systems and Science has become the pre-eminent textbook in its field, for students and practitioners alike. Its unique approach communicates the richness and diversity of GIS in a lucid and accessible format. This fully revised and updated second edition reinforces the view of GIS as a gateway to science and...

Building Applications with Microsoft® Outlook® Version 2002
Building Applications with Microsoft® Outlook® Version 2002

This book is designed primarily for Microsoft Outlook application developers using Microsoft Exchange Server. Many of the examples assume that you’ll be deploying workgroup applications in an Exchange Server environment using both public and private folders. It’s also assumed that you’ll be using Outlook 2002 to run the...

Cryptography for Developers
Cryptography for Developers
The only guide for software developers who must learn and implement cryptography safely and cost effectively.

The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent
...
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
The loss of sensitive data continues to be a signifi cant concern for both organizations as well as individuals whose information may be at risk of a breach. Organizations that experience a data breach can suffer reputational damage, loss of customer and constituent confi dence, legal and regulatory scrutiny, and the direct costs of managing an...
The Oxford Dictionary of Idioms
The Oxford Dictionary of Idioms
`Anyone who is addicted to the richness of the English language or simply intrigued by the origin and meaning of an idiom like "teach your grandmother to suck eggs" will relish this work.' Library Journal

Did you know that 'flavor of the month' originated in a marketing campaign in American ice-cream parlors in the
...
Advertisers at Work
Advertisers at Work

“Conversations with some of the sharpest minds in advertising lead the reader gently into the heart of the business. A great read whether you’re starting out in advertising or simply want to pick up some tips from the greats.”

Mark Tungate, author of Adland: A Global History of...

unlimited object storage image
Result Page: 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy