Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

Business Information Systems: 14th International Conference, BIS 2011, Pozna, Poland
Business Information Systems: 14th International Conference, BIS 2011, Pozna, Poland

BIS 2011 held in Pozna´n, Poland, was the 14th in a series of international conferences on business information systems. The BIS conference series has been recognized by professionals from the very beginning as a forum for the exchange and dissemination of topical research in the development, implementation, application and...

Practical Methods of Financial Engineering and Risk Management: Tools for Modern Financial Professionals
Practical Methods of Financial Engineering and Risk Management: Tools for Modern Financial Professionals

Risk control, capital allocation, and realistic derivative pricing and hedging are critical concerns for major financial institutions and individual traders alike. Events from the collapse of Lehman Brothers to the Greek sovereign debt crisis demonstrate the urgent and abiding need for statistical tools...

Food Composition and Analysis: Methods and Strategies
Food Composition and Analysis: Methods and Strategies

This book covers methods and strategies related to food composition and analysis. Topics include antioxidant activity of maize bran arabinoxylan microspheres; active packaging based on the release of carvacrol and thymol for fresh food; enzymes for the flavor, dairy, and baking industries; membrane technology in food processing; tenderization...

Learning SAP Analytics Cloud
Learning SAP Analytics Cloud

Key Features

  • Predict new opportunities and risks in a few mouse clicks
  • Eliminate complexity with tools that let you plan, analyze, and collaborate in context—in real time
  • Discover, visualize, plan, and predict in a single product with agile BI tools

Book...

RFID Handbook: Applications, Technology, Security, and Privacy
RFID Handbook: Applications, Technology, Security, and Privacy
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
The Project Management Advisor: 18 Major Project Screw-Ups, and How to Cut Them off at the Pass
The Project Management Advisor: 18 Major Project Screw-Ups, and How to Cut Them off at the Pass

This is the eBook version of the printed book.

This is your complete, hands-on guide to saving projects in trouble.

Drawing on 20 years of frontline project management experience, Lonnie Pacelli identifies the 18 most pervasive causes of project failure: their causes, early warning signs, and how to fix them...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Three Paths to Profitable Investing: Using ETFs in Healthcare, Infrastructure, and the Environment to Grow Your Assets
Three Paths to Profitable Investing: Using ETFs in Healthcare, Infrastructure, and the Environment to Grow Your Assets

Discover Today’s Newest, Best Paths to Sustainable Wealth

  • Master lower-cost, lower-risk ETF investing in tomorrow’s hottest growth areas: healthcare, infrastructure, and green technology
  • Profit from demographic change and other powerful global trends
  • Learn...
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...

Radiobiology and Environmental Security (NATO Science for Peace and Security Series C: Environmental Security)
Radiobiology and Environmental Security (NATO Science for Peace and Security Series C: Environmental Security)

This volume - like the N.A.T.O. Advanced Research Workshop on which it is based - addresses the fundamental science that contributes to our understanding of the potential risks from ecological terrorism, i.e. dirty bombs, atomic explosions, intentional release of radionuclides into water or air. Both effects on human health (D.N.A. and...

unlimited object storage image
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy