Home | Amazing | Today | Tags | Publishers | Years | Search 
Next Generation Networks: Perspectives and Potentials
Next Generation Networks: Perspectives and Potentials

Next Generation Networks (NGN) provide ubiquitous connectivity with pervasive accessibility to service, application, content and information.  NGN will bring tremendous advantages to companies and individuals, in terms of access to information, education and knowledge, efficiency, dematerialisation and new user experiences.

...

The Official CHFI Study Guide (Exam 312-49)
The Official CHFI Study Guide (Exam 312-49)
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an...
Instant Boris Effects (VASST Instant)
Instant Boris Effects (VASST Instant)
Boris plug-in applications, including Graffiti, FX, and Red, permit video editors to add titling, effects, compositing, and 3D capabilities to their nonlinear editing (NLE) systems. Documentation and training materials have been notoriously lacking for these applications. Instant Boris Effects is a complete guide for novice and intermediate users...
Basic Computing with Windows XP: Learning Made Simple
Basic Computing with Windows XP: Learning Made Simple
*First class handbooks for first-class learning
*Learning Made Simple, a colourful approach to support self-study and training courses alike
*Written by experienced trainers for inexperienced learners to succeed, matched to main qualifications

This handy textbook covers all you need to know about the basics of computing....
Semantic Web for the Wo Ontologist: Effective Modeling in RDFS and OWL
Semantic Web for the Wo Ontologist: Effective Modeling in RDFS and OWL
The promise of the Semantic Web to provide a universal medium to exchange data information and knowledge has been well publicized. There are many sources too for basic information on the extensions to the WWW that permit content to be expressed in natural language yet used by software agents to easily find, share and integrate information. Until...
Shut Up, Stop Whining, and Get a Life: A Kick-Butt Approach to a Better Life
Shut Up, Stop Whining, and Get a Life: A Kick-Butt Approach to a Better Life
Internationally renowned success philosopher, business speaker, and humorist, Larry Winget offers advice that flies in the face of conventional self-help. He believes that the motivational speakers and self-help gurus seem to have forgotten that the operative word in self-help is "self." That is what makes this book so different. Shut Up,...
Knowledge Management in the Public Sector: A Blueprint for Innovation in Government
Knowledge Management in the Public Sector: A Blueprint for Innovation in Government
The term public sector refers to the functioning agencies and units at the federal, state, county, municipal, and local levels of government. The sector includes all agencies, government corporations, the military, and departments, agencies, and miscellaneous units that perform some form of public service. They range in size from the largest...
CISA Review Manual 2008
CISA Review Manual 2008
The CISA Review Manual 2008 has been completely revised and updated with new content to reflect changing industry principles and practices, and is organized according to the current CISA job practice areas. The manual features detailed descriptions of the tasks performed by IS auditors and the knowledge required to plan, manage and perform IS...
Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology
Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology
Driven by the need and desire to reduce costs, organizations are faced with a set of decisions that require analytical scrutiny. Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology examines cost-saving trends in architecture planning, administration, and management....
Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • Designing Successful e-Learning, Michael Allen's Online Learning Library
    Designing Successful e-Learning, Michael Allen's Online Learning Library
    “The theoretical literature on learning and growth can be difficult to master and even more challenging to integrate into e-learning, but Michael has made this easy for all of us. He explains this thinking in clear and accessible language, amplifies the theories with research results, and describes popular approaches by applying these...
    Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
    Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
    Mark Weisers vision of computers moving out of our focus of attention and becoming oblivious devices that occur in large numbers and provide smart computing und communication services to individuals as needed is still far from being reality.

    This book puts the larger vision of ubiquitous computing in the context of todays mobile and distributed...

    Result Page: 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 
    ©2024 LearnIT (support@pdfchm.net) - Privacy Policy