Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Mac OS X Lion: Peachpit Learning Series
Mac OS X Lion: Peachpit Learning Series

The latest update of Robin Williams bestselling guide will have you working miracles in no time with Mac OS X Lion. With this book, you can learn in your own way, whether it's working through the lessons from start to finish, jumping straight to step-by-step exercises about new features, or looking up just what you need to know at that...

Oracle JD Edwards EnterpriseOne 9.0: Supply Chain Management Cookbook
Oracle JD Edwards EnterpriseOne 9.0: Supply Chain Management Cookbook
Oracle's JD Edwards EnterpriseOne Supply Chain Management (SCM) application suite aids your business in enhancing your interactions with Enterprise suppliers, and this practical cookbook provides essential implementation sequences to make the most of the suite. The functionality across the application described in this...
HTML5 Games: Creating Fun with HTML5, CSS3, and WebGL
HTML5 Games: Creating Fun with HTML5, CSS3, and WebGL
"All this is done in HTML5, by the way!" exclaimed Steve Jobs, the mind and face of the Apple success story, as he walked the audience through the new HTMLs-powered ad system at the iPhone OS 4.0 Keynote, receiving cheers, laughs, and applause in return. The recent developments in open, standards-based web technologies...
Restricted Kalman Filtering: Theory, Methods, and Application (SpringerBriefs in Statistics)
Restricted Kalman Filtering: Theory, Methods, and Application (SpringerBriefs in Statistics)

In this book, I highlight the developments in Kalman filtering subject to general linear constraints. Essentially, the material to be presented is almost entirely based on the results and examples originally developed in Pizzinga et al. (2008a), Cerqueira et al. (2009), Pizzinga (2009, 2010), Souza et al. (2011), Pizzinga et al. (2011), and...

What's Science Ever Done For Us: What the Simpsons Can Teach Us About Physics, Robots, Life, and the Universe
What's Science Ever Done For Us: What the Simpsons Can Teach Us About Physics, Robots, Life, and the Universe
A playful and entertaining look at science on The Simpsons

This amusing book explores science as presented on the longest-running and most popular animated TV series ever made: The Simpsons. Over the years, the show has examined such issues as genetic mutation, time travel, artificial intelligence, and even aliens.
...
The Best Damn Management Book Ever: 9 Keys to Creating Self-Motivated High Achievers
The Best Damn Management Book Ever: 9 Keys to Creating Self-Motivated High Achievers

Anyone who knows me knows I am a maniacal sports fan. I religiously follow Major League Baseball (San Francisco Giants), NFL football (New York Giants), and NBA basketball (Boston Celtics). My knowledge of useless sports trivia has won me numerous drinks in more bars than I care to remember. I see nothing wrong with Jimmy Fallon’s...

SAP ABAP Advanced cookbook
SAP ABAP Advanced cookbook

Advanced Business Application Programming (ABAP) is SAP’s proprietary 4th Generation Language (4GL). SAP core is written almost entirely in ABAP. ABAP is a high level programming language used in SAP for development and other customization processes. This book covers advanced SAP programming applications with ABAP. It teaches you to...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Discrete Mathematics and Its Applications
Discrete Mathematics and Its Applications

Discrete Mathematics and its Applications, Seventh Edition, is intended for one- or two-term introductory discrete mathematics courses taken by students from a wide variety of majors, including computer science, mathematics, and engineering. This renowned best-selling text, which has been used at over 500 institutions around the world,...

Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)
Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)

Evidenced by the success of Facebook, Twitter, and LinkedIn, online social networks (OSNs) have become ubiquitous, offering novel ways for people to access information and communicate with each other. As the increasing popularity of social networking is undeniable, scalability is an important issue for any OSN that wants to serve a large...

The Routledge Guidebook to Heidegger's Being and Time (The Routledge Guides to the Great Books)
The Routledge Guidebook to Heidegger's Being and Time (The Routledge Guides to the Great Books)

The Routledge Guidebook to Heidegger’s Being and Time examines the work of one of the most controversial thinkers of the twentieth century. Heidegger’s writings are notoriously difficult, requiring careful reading. This book analyses his first major publication, Being and Time, which to this day remains his most...

unlimited object storage image
Result Page: 1241 1240 1239 1238 1237 1236 1235 1234 1233 1232 1231 1230 1229 1228 1227 1226 1225 1224 1223 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy