Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Working With Your Doctor: Getting the Healthcare You Deserve (Patient Centered Guides)
Working With Your Doctor: Getting the Healthcare You Deserve (Patient Centered Guides)

Getting the best healthcare in today's world requires that you participate in the process. Working with Your Doctor: Getting the Healthcare You Deserve will help you to be your own advocate, to get the very vest in healthcare, and to have the best possible relationship with your doctors. It will show you how to become an...

Tech Job Hunt Handbook: Career Management for Technical Professionals
Tech Job Hunt Handbook: Career Management for Technical Professionals

Tech Job Hunt Handbook is a career management book—just for technology professionals—that reflects today’s new economic realities. The world of work is constantly changing, and staying professionally relevant while competing for more specialized tech jobs in areas like cloud computing, mobile and social...

Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing
Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing

Interactive curve modeling techniques and their applications are extremely useful in a number of academic and industrial settings, and specifically play a significant role in multidisciplinary problem solving, such as in font design, designing objects, CAD/CAM, medical operations, scientific data visualization, virtual reality, character...

Web 2.0 Security - Defending AJAX, RIA, AND SOA
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security...
The Wiley Handbook of Action Research in Education (Wiley Handbooks in Education)
The Wiley Handbook of Action Research in Education (Wiley Handbooks in Education)

Comprehensive overview of the theoretical, conceptual, and applied/practical presentations of action research as it is found and conducted solely in educational settings

The Wiley Handbook of Action Research in Education is the first book to offer theoretical, conceptual, and applied/practical presentations...

Advanced Topics in Electronic Commerce
Advanced Topics in Electronic Commerce
The Advanced Topics in Electronic Commerce Series provides comprehensive coverage and understanding of the social, cultural, organizational, human, and cognitive impacts of the EC technologies and advances on organizations around the world. These impacts include those of EC on consumer behavior as well as on organizational behavior, development,...
The Caucasus - An Introduction (Routledge Contemporary Russia and Eastern Europe Series)
The Caucasus - An Introduction (Routledge Contemporary Russia and Eastern Europe Series)

The Caucasus is one of the most complicated regions in the world: with many different peoples and political units, differing religious allegiances, and frequent conflicts, and where historically major world powers have clashed with each other. Until now there has been no single book for those wishing to learn about this complex region. This book...

The Truth About HTML5 (For Web Designers)
The Truth About HTML5 (For Web Designers)

This is the book for web designers, web developers, and front-end coders who want to get up to speed with HTML5 in 2012. This is the book that isn’t afraid to point out what everyone gets wrong about HTML5’s new markup, so you don’t make the same mistakes. This is the book that will show you what rocks in HTML5 today and...

Snatched: The FBI's Top Ten Art Crimes and more (Synova's Case Files)
Snatched: The FBI's Top Ten Art Crimes and more (Synova's Case Files)
Sit back and relax as Synova regales you with tales of master art thieves, bumbling criminals, and multi-million-dollar art heists from around the world. There will be stories of mafia-commissioned heists, of Daredevil art thieves, and of the brave men and women of the FBI Art team who are trying to stop this multi-billion-dollar industry of art...
Fundamentals of Computer Science using Java
Fundamentals of Computer Science using Java
In the summer of 1996, our Computer Science department made the decision to use Java as the core language for our Computer Science program, beginning that fall. Although there were many Java books available, we soon discovered that most were “trade” or “hobby” books, not designed for university courses and certainly not...
Image Processing: Principles and Applications
Image Processing: Principles and Applications
Image processing—from basics to advanced applications

Learn how to master image processing and compression with this outstanding state-of-the-art reference. From fundamentals to sophisticated applications, Image Processing: Principles and Applications covers multiple topics and provides a fresh perspective on future directions and...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy