Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Entrepreneur's Guide to Managing Information Technology
The Entrepreneur's Guide to Managing Information Technology
Software. Hardware. Networks. Wireless. Entrepreneurs face a bewildering array of choices and decisions when it comes to incorporating technology into the fabric of their businesses. Yet nothing could be more important these days. Aligning information technology (IT) with business strategy is essential to meet and beat the competition. As business...
Make a Mind-Controlled Arduino Robot: Use Your Brain as a Remote (Creating With Microcontrollers Eeg, Sensors, and Motors)
Make a Mind-Controlled Arduino Robot: Use Your Brain as a Remote (Creating With Microcontrollers Eeg, Sensors, and Motors)
Shortly, you will build your own mind-controlled robot. But that’s just the beginning of what you’ll be able to do. As you follow the explanations for components and codes, you will thoroughly understand how your robot works. You can keep applying the knowledge to your own robots and EEGbased...
Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard
Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard

Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect...

Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks.
...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

How to Do Everything with Your iPAQ Pocket PC
How to Do Everything with Your iPAQ Pocket PC
Now you can do more with your HP iPAQ Pocket PC than you ever thought possible. Use this step-by-step guide to discover all the essentials about your iPAQ and put it to work with a thorough exploration of its hardware, software, and accessories. Learn how to use your iPAQ as a portable entertainment station for music, movies and games. Find out how...
AutoCAD: Secrets Every User Should Know
AutoCAD: Secrets Every User Should Know

Discover Powerful Techniques and Features That Most Users Overlook

Whether you're designing houses, landscapes, or machines, there are AutoCAD tricks-of-the-trade that even seasoned users don't know—tips that can improve your skills, understanding, and productivity. This practical, in-depth...

The Business Coaching Toolkit: Top 10 Strategies for Solving the Toughest Dilemmas Facing Organizations
The Business Coaching Toolkit: Top 10 Strategies for Solving the Toughest Dilemmas Facing Organizations

Discover the 10 best Coaching practices for solving problems and implementing change with clients—right away

Coaching works, there's no doubt about that. But the coaching industry is going through tremendous change that all professional coaches need to address.

Equipping coaching professionals to stay on the...

Essentials of Managing Corporate Cash
Essentials of Managing Corporate Cash
Full of valuable tips, techniques, illustrative real-world examples, exhibits, and best practices, this handy and concise book will help you stay up to date on the newest thinking, strategies and technologies in managing corporate cash.

Full of valuable tips, techniques, illustrative real-world examples, exhibits, and best practices, this...

Advances in Multiresolution for Geometric Modelling (Mathematics and Visualization)
Advances in Multiresolution for Geometric Modelling (Mathematics and Visualization)

Multiresolution methods in geometric modelling are concerned with the generation, representation, and manipulation of geometric objects at several levels of detail. Applications include fast visualization and rendering as well as coding, compression, and digital transmission of 3D geometric objects.

This book marks the culmination of the...

How to Survive in the Jungle of Enterprise Architecture Frameworks: Creating or Choosing an Enterprise Architecture Framework
How to Survive in the Jungle of Enterprise Architecture Frameworks: Creating or Choosing an Enterprise Architecture Framework
Several times in my Enterprise Architecture (EA) practice, people asked me which framework shall I adopt or what are the benefits of the Zachman framework over TOGAF, etc. Others asked me to help them to define their own corporate EA framework. Before answering these types of questions, it is important to know what the differences and commonalities...
Recognizing Patterns in Signals, Speech, Images, and Videos: ICPR 2010 Contents
Recognizing Patterns in Signals, Speech, Images, and Videos: ICPR 2010 Contents

The 20th ICPR (International Conference on Pattern Recognition) Conference took place in Istanbul, Turkey, during August 23–26, 2010. For the first time in the ICPR history, several scientific contests (http://www.icpr2010.org/ contests.php) were organized in parallel to the conference main tracks. The purpose of these contests was to...

unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy