Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Absolute Beginner's Guide to Security, Spam, Spyware & Viruses
Absolute Beginner's Guide to Security, Spam, Spyware & Viruses

Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? ...

Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
You own your own business. You have also created a website for your business that details the products or services that you offer, but it doesn't allow potential customers to purchase anything online. Don't risk losing business-learn to create a dynamic online environment using only three programs. PHP, MySQL and Apache are three popular...
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
Privacy at Risk: The New Government Surveillance and the Fourth Amendment
"The discussion of surveillance techniques is excellent, the legal analysis is sound, and the case for Fourth Amendment reform compelling. Recommended."-Choice (D. E. Smith Choice )

Without our consent and often without our knowledge, the government can constantly...
Three Paths to Profitable Investing: Using ETFs in Healthcare, Infrastructure, and the Environment to Grow Your Assets
Three Paths to Profitable Investing: Using ETFs in Healthcare, Infrastructure, and the Environment to Grow Your Assets

Discover Today’s Newest, Best Paths to Sustainable Wealth

  • Master lower-cost, lower-risk ETF investing in tomorrow’s hottest growth areas: healthcare, infrastructure, and green technology
  • Profit from demographic change and other powerful global trends
  • Learn...
Food Carbohydrate Chemistry
Food Carbohydrate Chemistry
Carbohydrates are major components of foods, accounting for more than 90% of the dry matter of fruits and vegetables and providing for 70-80% of human caloric intake worldwide (BeMiller and Huber 2008). Thus, from a quantitative perspective alone, carbohydrates warrant the attention of food chemists. From the standpoint of food...
Refactoring Databases : Evolutionary Database Design
Refactoring Databases : Evolutionary Database Design

Refactoring has proven its value in a wide range of development projectshelping software professionals improve system designs, maintainability, extensibility, and performance. Now, for the first time, leading agile methodologist Scott Ambler and renowned consultant Pramodkumar Sadalage introduce powerful refactoring techniques...

Fundamentals of Risk and Insurance
Fundamentals of Risk and Insurance
This tenth edition of Fundamentals of Risk and Insurance marks the 36th anniversary of the first edition, published in 1972. Over the years, the book has undergone major change as the field of risk management and insurance has changed. Emmett J. Vaughan, an author in the first and all subsequent editions, guided the...
Radiobiology and Environmental Security (NATO Science for Peace and Security Series C: Environmental Security)
Radiobiology and Environmental Security (NATO Science for Peace and Security Series C: Environmental Security)

This volume - like the N.A.T.O. Advanced Research Workshop on which it is based - addresses the fundamental science that contributes to our understanding of the potential risks from ecological terrorism, i.e. dirty bombs, atomic explosions, intentional release of radionuclides into water or air. Both effects on human health (D.N.A. and...

Practical Zendesk Administration
Practical Zendesk Administration
"Reading these chapters is like reading the advanced manual we never wrote when we designed the product. Stafford and Anton's ability to enlighten readers on how to use the product better and the reasons for the design decisions in Zendesk never ceases to impress us."
-Mikkel Svane, Founder and CEO at
...
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the...

Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
Advanced Quantitative Finance with C++
Advanced Quantitative Finance with C++

Create and implement mathematical models in C++ using Quantitative Finance

About This Book

  • Describes the key mathematical models used for price equity, currency, interest rates, and credit derivatives
  • The complex models are explained step-by-step along with a flow chart of every...
unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy