Home | Amazing | Today | Tags | Publishers | Years | Search 
Language and the Internet
Language and the Internet
According to popular mythology, the Internet will be bad for the future of language--technospeak will rule, standards will be lost, and creativity diminished as globalization imposes sameness. David Crystal, one of the foremost authorities on language, argues the reverse in his new book: that the Internet is enabling a dramatic expansion of the...
The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
The content goes from the basics to advanced topics such as off-shoring, anti-circumvention, open source business models, user-created content, reverse engineering, mobile media distribution, web and game development, mash-ups, web widgets, and massively multiplayer games.

This book is designed to empower you to:

* Understand
...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Software Engineering: International Summer Schools, ISSSE 2006-2008, Salerno, Italy, Revised Tutorial Lectures
Software Engineering: International Summer Schools, ISSSE 2006-2008, Salerno, Italy, Revised Tutorial Lectures
Software engineering is widely recognized as one of the most exciting, stimulating, and profitable research areas, with a significant practical impact on the software industry. Thus, training future generations of software engineering researchers and bridging the gap between academia and industry are vital to the field. The International Summer...
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Personality Disorders (Diseases and Disorders)
Personality Disorders (Diseases and Disorders)
Charles Best, one of the pioneers in the search for a cure for diabetes, once explained what it is about medical research that intrigued him so. “It’s not just the gratification of knowing one is helping people,” he confided, “although that probably is a more heroic and selfless motivation. Those feelings may enter in, but...
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into...
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
JBoss Tools 3 Developers Guide
JBoss Tools 3 Developers Guide
JBoss Tools consist of the best Java frameworks and technologies placed together under the same "roof". Discovering JBoss Tools is like exploring a cave; at first everything seems unknown and complicated, but once you become familiar with the main features of the Tools, you will start to feel at home.

This is the first book in
...
Fool-Proof Marketing: 15 Winning Methods for Selling Any Product or Service in Any Economy
Fool-Proof Marketing: 15 Winning Methods for Selling Any Product or Service in Any Economy
As I mentioned, an old saying informs us, “It’s not what happens to you; it’s how you handle it.” Nowhere is that truer than during a business crisis, slump, or downturn.

Of the 15 fool-proof business strategies presented in this book, none are more important than the personal strategies presented in Part I. The
...
Color Atlas of Pharmacology (Thieme Flexibook)
Color Atlas of Pharmacology (Thieme Flexibook)

The present second edition of the Color Atlas of Pharmacology goes to print six years after the first edition. Numerous revisions were needed, highlighting the dramatic continuing progress in the drug sciences. In particular, it appeared necessary to include novel therapeutic principles, such as the inhibitors of platelet aggregation from the...

Disarming Strangers
Disarming Strangers

In June 1994 the United States went to the brink of war with North Korea. With economic sanctions impending, President Bill Clinton approved the dispatch of substantial reinforcements to Korea, and plans were prepared for attacking the North's nuclear weapons complex. The turning point came in an extraordinary private diplomatic...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy