Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Master the tools and techniques of mobile forensic investigations

...
Algorithmic Number Theory, Vol. 1: Efficient Algorithms (Foundations of Computing)
Algorithmic Number Theory, Vol. 1: Efficient Algorithms (Foundations of Computing)

Algorithmic Number Theory provides a thorough introduction to the design and analysis of algorithms for problems from the theory of numbers. Although not an elementary textbook, it includes over 300 exercises with suggested solutions. Every theorem not proved in the text or left as an exercise has a reference in the notes section...

JavaScript Application Cookbook
JavaScript Application Cookbook
Seasoned Java coders will find the JavaScript Application Cookbook compiled just for them. Written in the same vein as the old-style programmer "toolbox" titles, this book sheds the usual tutorial presentation and simply introduces a series of JavaScript applications you can use on your own sites.

The cookbook begins with...

Java: The Complete Reference, Ninth Edition
Java: The Complete Reference, Ninth Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

The Definitive Java Programming Guide

Fully updated for Java SE 8, Java: The Complete Reference, Ninth Edition...

Computational Fluid Dynamics: An Introduction (Von Karman Institute Book)
Computational Fluid Dynamics: An Introduction (Von Karman Institute Book)
Computational Fluid Dynamics: An Introduction grew out of a von Karman Institute (VKI) Lecture Series by the same title first presented in 1985 and repeated with modifications every year since that time.

The objective, then and now, was to present the subject of computational fluid dynamics (CFD) to an audience unfamiliar with all but
...
Essentials of Anatomy and Physiology
Essentials of Anatomy and Physiology

Describes and illustrates the important aspects of anatomy, physiology, and pathophysiology.

Afifth edition of Essentials of Anatomy and Physiology is very gratifying, and again we have the pleasure of thanking all of our colleagues in teaching who continue to use our textbook and of welcoming new teachers and students. ...
E=mc2: A Biography of the World's Most Famous Equation
E=mc2: A Biography of the World's Most Famous Equation

Already climbing the bestseller lists-and garnering rave reviews-this "little masterpiece"* sheds brilliant light on the equation that changed the world.

"This is not a physics book. It is a history of where the equation [E=mc2] came from and how it has changed the world. After a short chapter on the
...

The Data Model Resource Book, Vol. 1: A Library of Universal Data Models for All Enterprises
The Data Model Resource Book, Vol. 1: A Library of Universal Data Models for All Enterprises
"These books are a must for any company implementing data models. They contain practical insights and templates of universal data models which can be used by all enterprises, regardless of their level of experience."–Ron Powell, Publisher, DM Review

Industry experts raved about The Data Model Resource Book when it first came...

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Using Scribe Insight: Developing Integrations and Migrations using the Scribe Insight Platform
Using Scribe Insight: Developing Integrations and Migrations using the Scribe Insight Platform

Understand how to utilize the workbench, console, adapters, publisher, and other components in Scribe to ensure you have a rapid development toolkit that will drastically reduce your workload and timeline. In Using Scribe Insight, you’ll learn to build your integrations and migrations with the minimal amount of effort, what...

OCA Oracle Database 12c SQL Fundamentals I Exam Guide (Exam 1Z0-061) (Oracle Press)
OCA Oracle Database 12c SQL Fundamentals I Exam Guide (Exam 1Z0-061) (Oracle Press)

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

A Complete Study System for OCA Exam 1Z0-061

Prepare for the Oracle Certified Associate Oracle Database 12c SQL...

Result Page: 31 30 29 28 27 26 25 24 23 22 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy