Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
The Warren Buffett Way
The Warren Buffett Way

Warren Buffett is the most famous investor of all time and one of today’s most admired business leaders. He became a billionaire and investment sage by looking at companies as businesses rather than prices on a stock screen. The first two editions of The Warren Buffett Way gave investors their first in-depth look at the...

OZONE A New Medical Drug
OZONE A New Medical Drug

Oxygen-ozone therapy is a complementary approach less known than homeopathy and acupuncture because it has come of age only three decades ago. This book clarifies that, in the often nebulous field of natural medicine, the biological bases of ozone therapy are totally in line with classic biochemical, physiological and pharmacological...

Principles of Geometry (Cambridge Library Collection - Mathematics)
Principles of Geometry (Cambridge Library Collection - Mathematics)

Henry Frederick Baker (1866-1956) was a renowned British mathematician specialising in algebraic geometry. First published between 1922 and 1925, this six-volume work provides a detailed insight into the geometry which was developing at the time of publication. Volume 1 describes the foundations of projective geometry.

...
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing...

Programming with Microsoft Visual Basic 2012
Programming with Microsoft Visual Basic 2012

PROGRAMMING WITH MICROSOFT VISUAL BASIC 2012, 6E by best-selling author Diane Zak is the ideal choice for your introduction to programming. Readers learn to master the basics of effective programming as they work through a wealth of hands-on applications in this book's engaging real-world setting. Numerous learning features address...

GameMaker: Studio 100 Programming Challenges
GameMaker: Studio 100 Programming Challenges
Push your GameMaker programming skills to the edge with 100 programming challenges using the popular GameMaker: Studio and GML. Each challenge includes an outline of the challenge, a scoring and time guide, useful GML code, and a working example provided in GMZ format. For more advanced programmers, each challenge comes with an additional task...
Learn Keras for Deep Neural Networks: A Fast-Track Approach to Modern Deep Learning with Python
Learn Keras for Deep Neural Networks: A Fast-Track Approach to Modern Deep Learning with Python

Learn, understand, and implement deep neural networks in a math- and programming-friendly approach using Keras and Python. The book focuses on an end-to-end approach to developing supervised learning algorithms in regression and classification with practical business-centric use-cases implemented in Keras.

The overall...

The Definitive Guide to JSF in Java EE 8: Building Web Applications with JavaServer Faces
The Definitive Guide to JSF in Java EE 8: Building Web Applications with JavaServer Faces
Learn and master the new features in the JSF 2.3 MVC web framework in this definitive guide written by two of the JavaServer Faces (JSF) specification leads. The authors take you through real-world examples that demonstrate how these new features are used with other APIs in Java EE 8. You’ll see the new and exciting ways...
Full Stack JavaScript: Learn Backbone.js, Node.js, and MongoDB
Full Stack JavaScript: Learn Backbone.js, Node.js, and MongoDB

Learn agile JavaScript web development using the latest cutting-edge front-end and back-end technologies including Node.js, MongoDB, Backbone.js, Parse.com, Heroku, and Microsoft Azure. Using a key project example of a message board app, you will learn the foundations of a typical web application: fetching data, displaying...

Disadvantaged Children in India: Empirical Evidence, Policies and Actions
Disadvantaged Children in India: Empirical Evidence, Policies and Actions
This book addresses issues concerning five major categories of disadvantaged children, namely street children, children involved in trafficking, child labor, slum children, and children in institutional care, which apply to a large number of children around the world, including India. Compiling primary and secondary research-based evidences in...
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CCNP Data Center Application Centric...
unlimited object storage image
Result Page: 1206 1205 1204 1203 1202 1201 1200 1199 1198 1197 1196 1195 1194 1193 1192 1191 1190 1189 1188 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy