Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fedora Linux
Fedora Linux

"Neither a "Starting Linux" book nor a dry reference manual, this book has a lot to offer to those coming to Fedora from other operating systems or distros." -- Behdad Esfahbod, Fedora developer

This book will get you up to speed quickly on Fedora...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Socially Responsible IT Management
Socially Responsible IT Management
"A recommended read for all IT professionals and a must read for those in management."Tom Molnar, business systems analyst

"The combination of practicality, ease of implementation, and positive return on investment is what makes this book work so well. The easy-to-implement action steps makes dealing with these ten social
...
Applied SOA: Service-Oriented Architecture and Design Strategies
Applied SOA: Service-Oriented Architecture and Design Strategies
You need more than theory to make SOA work.

You need this practical guide.

The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business...

Professional Microsoft SharePoint 2007 Workflow Programming
Professional Microsoft SharePoint 2007 Workflow Programming
Microsoft Windows SharePoint Services (WSS) 3.0 and Microsoft Office SharePoint Server (MOSS) 2007 provide you with a rich framework for collaborative applications. Packed with practical, real-world examples, this book offers you clear instructions for implementing workflow, custom activities, and conditions into SharePoint applications....
JBoss in Action: Configuring the JBoss Application Server
JBoss in Action: Configuring the JBoss Application Server
JBoss in Action is the first book to focus on teaching readers in detail how to use the JBoss application server. Unlike other titles about JBoss, the authors of JBoss in Action go deeper into the advanced features and configuration of the server. In particular, it focuses on enterprise-class topics, such as high availability,...
Aspects of Explosives Detection
Aspects of Explosives Detection
Detection and quantification of trace chemicals is a major thrust of analytical chemistry. In recent years much effort has been spent developing detection systems for priority pollutants. Less mature are the detections of substances of interest to law enforcement and security personnel:in particular explosives. This volume will discuss the...
Information Security Governance (Wiley Series in Systems Engineering and Management)
Information Security Governance (Wiley Series in Systems Engineering and Management)
This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the...
Building Cocoa Applications : A Step by Step Guide
Building Cocoa Applications : A Step by Step Guide
Building Cocoa Applications is an ideal book for serious developers who want to write programs for the Mac OS X using Cocoa. It's a no-nonsense, hands-on text that's filled with examples -- not only simple and self-contained examples of individual Cocoa features, but extended examples of complete applications with enough sophistication...
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems...
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

unlimited object storage image
Result Page: 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy