Home | Amazing | Today | Tags | Publishers | Years | Search 
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace (Queconsumerother)
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more...
Nuclear Magnetic Resonance Spectroscopy: An Introduction to Principles, Applications, and Experimental Methods
Nuclear Magnetic Resonance Spectroscopy: An Introduction to Principles, Applications, and Experimental Methods

Nuclear magnetic resonance (NMR) has become the chemist's most general structural tool. It is one of the few techniques that may be applied to all three states of matter. Some spectra may be obtained from less than a microgram of material. In the early 1960s, spectra were taken crudely on strip-chart recorders. The field has since seen one...

IT Compliance and Controls: Best Practices for Implementation
IT Compliance and Controls: Best Practices for Implementation
Praise for IT Compliance and Controls

"James DeLuccia outlines a comprehensive, integrated strategy for achieving regulatory and legislative compliance. This approach is vastly superior, both in scalability and in sustainability, to the siloed compliance strategies that are often seen."
—Dr. Richard Reiner, founder,
...

Digital Image Processing Using MATLAB(R)
Digital Image Processing Using MATLAB(R)
This is the first book that provides a balanced treatment of image processing basics and software principles used in the practical application of image processing. Working in the MATLAB computing environment, it provides a stable, well-supported set of software tools capable of addressing a broad spectrum of applications in digital image...
Nmap in the Enterprise: Your Guide to Network Scanning
Nmap in the Enterprise: Your Guide to Network Scanning
Richard Stiennon, vice president at Gartner
"Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."

A
...
Computational Approaches to Morphology and Syntax (Oxford Surveys in Syntax & Morphology)
Computational Approaches to Morphology and Syntax (Oxford Surveys in Syntax & Morphology)
"This book should undoubtedly be of great interest to students and researchers of morphology, syntax, computational linguistics, and natural language processing. The book provides an excellent systematics overivew of the current state-of-the-art of the field. The book includes extensive descriptions of the formal characterization of...
Information Technology Policy: An International History
Information Technology Policy: An International History
This book brings together a series of country-based studies to examine, in depth, the nature and extent of IT policies as they have evolved from a complex historical interaction of politics, technology, institutions, and social and cultural factors. In doing so many key questions are critically examined. Where can we find successful examples of IT...
ECOOP 2004 - Object-Oriented Programming: 18th European Conference, Oslo, Norway, June 14-18, 2004, Proceedings
ECOOP 2004 - Object-Oriented Programming: 18th European Conference, Oslo, Norway, June 14-18, 2004, Proceedings
ECOOP is the premier forum in Europe for bringing together practitioners, researchers, and students to share their ideas and experiences in a broad range of disciplines woven with the common thread of object technology. It is a collage of events, including outstanding invited speakers, carefully refereed technical papers, practitioner reports...
Data Communications and Computer Networks: For Computer Scientists and Engineers
Data Communications and Computer Networks: For Computer Scientists and Engineers
A broad introductory text written for computer scientists and engineers, focusing on the fundamental aspects of data communications and computer networks. This second edition has been thoroughly revised to cover current networking issues and technologies. Specific updates include those on networks and their management, transmission technologies,...
The Darkroom Cookbook, Third Edition
The Darkroom Cookbook, Third Edition
The art of darkroom developing and printing will never go out of style. Master darkroom specialist Steve Anchell is back to prove it in this long-awaited third edition of his enormously successful Darkroom Cookbook. Packed with over 200 "recipes," some common and others rare gems, you'll discover something new every time you open this...
Software Studies: A Lexicon (Leonardo Books)
Software Studies: A Lexicon (Leonardo Books)
This collection of short expository, critical, and speculative texts offers a field guide to the cultural, political, social, and aesthetic impact of software. Computing and digital media are essential to the way we work and live, and much has been said about their influence. But the very material of software has often been left invisible. In...
Sams Teach Yourself Adobe(R) InDesign(R) 1.5 in 24 Hours
Sams Teach Yourself Adobe(R) InDesign(R) 1.5 in 24 Hours
Sams Teach Yourself Adobe InDesign 1.5 in 24 Hours addresses each feature of Adobe's InDesign 1.5 in a proven tutorial method. The uniqueness of this book stems from the author's in-depth knowledge of the print industry. This book focuses on using InDesign in a professional environment rather than to produce simple documents at home or in a small...
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy