Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Handbook of Psychodiagnostic Testing: Analysis of Personality in the Psychological Report
Handbook of Psychodiagnostic Testing: Analysis of Personality in the Psychological Report

The Handbook of Psychodiagnostic Testing is an invaluable aid to students and professionals performing psychological assessments. It takes the reader from client referral to finished report, demonstrating how to synthesize details of personality and pathology into a document that is focused, coherent, and clinically meaningful.

...

A Tester's Guide to .NET Programming
A Tester's Guide to .NET Programming
Today’s software testing environment has changed. A common trend we are seeing these days is
advertisements for software developers and testers that look virtually the same. Today, companies
all seem to require software test professionals with in-depth knowledge of programming languages
and with significant database skills.
...
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Service-Oriented Computing (Cooperative Information Systems)
Service-Oriented Computing (Cooperative Information Systems)
Service-Oriented Computing (SOC) promises a world of cooperating services loosely connected, creating dynamic business processes and agile applications that span organizations and platforms. As a computing paradigm, it utilizes services as fundamental elements to support rapid, low-cost development of distributed applications in heterogeneous...
Perl Graphics Programming
Perl Graphics Programming

Graphics programmers aren't the only ones who need to be proficient with graphics. Web and applications programmers know that a dull web page can be quickly transformed into one that's interesting and lively with the use of well-planned graphics. And fortunately, you don't need the skills of a fulltime graphics programmer...

The Handbook of Task Analysis for Human-Computer Interaction
The Handbook of Task Analysis for Human-Computer Interaction
The most widely cited reference on task analysis has been Task-Analysis for Human-
Computer Interaction, edited by Dan Diaper, who must take the main blame for this new
Handbook of Task Analysis for Human-Computer Interaction, as his motive was in part to
stem the trickle of requests from around the world for chapters from the
...
Systems Analysis and Design (Shelly Cashman Series)
Systems Analysis and Design (Shelly Cashman Series)

Systems Analysis and Design, Eighth Edition offers a practical, visually appealing approach to information systems development.

As the Dilbert cartoon suggests, it is always a good idea to know whether a project fits the company’s overall strategy. You will learn more about the relationship between systems projects and...

Global E-government Readiness Report 2005: From E-government to E-inclusion
Global E-government Readiness Report 2005: From E-government to E-inclusion
In reaffirming the vision of a peaceful, prosperous and just world, leaders at the United Nations World Summit in 2005 outlined a vision of ‘…building a people-centred and inclusive information society, putting the potential of information and communication technologies at the service of development and addressing new challenges of the...
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

An Invitation to Computer Science, 5th Edition
An Invitation to Computer Science, 5th Edition

This text is intended for a one-semester introductory course in computer science. It presents a breadth-first overview of the discipline that assumes no prior background in computer science, programming, or mathematics. It is appropriate for use in a service course for students not majoring in computer science. It is also appropriate...

Issues in the Integration of Research and Operationsl Satellite Systems for Climate Research: Science and Design (Compass Series)
Issues in the Integration of Research and Operationsl Satellite Systems for Climate Research: Science and Design (Compass Series)
This is the first of two reports that address the complex issue of incorporating the needs of climate research into the National Polar-orbiting Operational Environmental Satellite System (NPOESS). NPOESS, which has been driven by the imperative of reliably providing short-term weather information, is itself a union of heretofore separate civilian...
unlimited object storage image
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy