Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Investment Banking: A Guide to Underwriting and Advisory Services
Investment Banking: A Guide to Underwriting and Advisory Services

The recent financial turmoil has raised suspects on investment banks and will certainly reshape the industry. However, the transactions traditionally managed by investment banks will still require the intervention of financial institutions, as always in the past. This book aims at providing an overview of these traditional investment banking...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD (Oracle Solaris Series)
DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD (Oracle Solaris Series)

In early 2004, DTrace remained nascent; while Mike Shapiro, Adam Leventhal, and I had completed our initial implementation in late 2003, it still had substantial gaps (for example, we had not yet completed user-level instrumentation on x86), many missing providers, and many features yet to...

Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
Security and Privacy for Microsoft Office 2010 Users
Security and Privacy for Microsoft Office 2010 Users
SECURITY AND PRIVACY issues with computers and computer networks are constantly in the news these days, and everyone seems to be concerned about them to some degree. Businesses everywhere are worried about having sensitive customer information such as credit card numbers or email addresses stolen,...
The Coder's Path to Wealth and Independence
The Coder's Path to Wealth and Independence

Developers, programmers, technical architects, and consultants: You are highly skilled and have deep commitment to your craft as well as the motivation to excel. It’s time to step away from the perceived security of a full-time salaried position, or a marginally successful solo business, and step into a world of freedom, independence,...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Android Application Development Cookbook - Second Edition
Android Application Development Cookbook - Second Edition

Over 100 recipes to help you solve the most common problems faced by Android Developers today

About This Book

  • Find the answers to your common Android programming problems, from set up to security, to help you deliver better applications, faster
  • Uncover the latest features of Android...
HIV, Resurgent Infections and Population Change in Africa (International Studies in Population)
HIV, Resurgent Infections and Population Change in Africa (International Studies in Population)

Forty years ago, the age-old battle against infectious diseases as a major threat to human health was believed close to being won. However, by the late twentieth century, the increase of emerging and reemerging infectious diseases was evident in both low and high income countries. About 30 new infectious diseases have been identified in the...

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?

With an expanded discussion of network protocols and 45 completely new scenarios, this extensively...

Architecting the Industrial Internet: The architect's guide to designing Industrial Internet solutions
Architecting the Industrial Internet: The architect's guide to designing Industrial Internet solutions

Learn the ins and outs of the Industrial Internet of Things through subjects ranging from its history and evolution, right up to what the future holds.

About This Book

  • Define solutions that can connect existing systems and newer cloud-based solutions to thousands of thousands of edge devices and...
Windows 10 Anniversary Update Bible
Windows 10 Anniversary Update Bible

Your all-inclusive guide to Windows 10 Anniversary Edition

Windows 10 Bible, Anniversary Update presents the ultimate reference for enterprise and professional Windows 10 Anniversary Update users. From setup and settings to networking and the daily workflow, this book provides expert guidance on all aspects of the OS....

unlimited object storage image
Result Page: 370 369 368 367 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy