Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Anatomy and Human Movement: Structure and function with PAGEBURST Access, 6e
Anatomy and Human Movement: Structure and function with PAGEBURST Access, 6e

Printed book plus PageburstT access - you will receive a printed book and access to the complete book content electronically. PageburstT enhances learning by not only bringing world class content to your fingertips but also letting you add to it, annotate it, and categorize it all in a way that suits you. PageburstT frees you to spend more...

Programming Microsoft Dynamics™ NAV 2015
Programming Microsoft Dynamics™ NAV 2015

Sharpen your skills and increase your productivity when programming Microsoft Dynamics NAV 2015

About This Book

  • The most comprehensive Dynamics NAV reference guide for programmers, developers, managers, and consultants
  • Covers all the elements needed to learn how to do development in NAV...
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results

The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.

Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This...

Joomla! Start to Finish: How to Plan, Execute, and Maintain Your Web Site
Joomla! Start to Finish: How to Plan, Execute, and Maintain Your Web Site

Everything you need to know to plan and maintain a Joomla! site

Joomla! offers powerful functionality and ease of configuration, making it an immensely popular open source content management system. However, far more than simply downloading and installing Joomla! is required in order to create a dynamic web site. This book...

CSS Cookbook, 2nd Edition
CSS Cookbook, 2nd Edition

As the industry standard method for enriching the presentation of HTML-based web pages, Cascading Style Sheets (CSS) allow you to give web pages more structure and a more sophisticated look. But first, you have to get past CSS theory and resolve real-world problems.

For those all-too-common dilemmas that...

Computational Approaches to Biochemical Reactivity (Understanding Chemical Reactivity)
Computational Approaches to Biochemical Reactivity (Understanding Chemical Reactivity)
This book summarises recent results in the rapidly developing discipline of the computational aspects of biochemical reactivity. It presents a comprehensive and critical treatise on the subject, with numerous references covering practically all relevant and recent work. The chapters, written by eminent experts in the field, deal with quantum...
Essential SharePoint 2007: A Practical Guide for Users, Administrators and Developers
Essential SharePoint 2007: A Practical Guide for Users, Administrators and Developers
If your business needs to control its documents, structure its workflow, or share information over the Web, you need SharePoint. It’s simply the quickest way to fill those needs using standard tools business users already know: Microsoft Office and Internet Explorer. Best of all, SharePoint is free (well, kind of); SharePoint Services are...
Acoustic Diffusers and Absorbers: Theory, Design and Application
Acoustic Diffusers and Absorbers: Theory, Design and Application
Every book tells a story and there is a story behind every book. This story begins in 1980, in the conference room of the laboratory for the structure of matter at the Naval Research Laboratory (NRL) in Washington, DC, where Peter D’Antonio was employed as a diffraction physicist. Knowing Peter’s interest in music, a colleague handed...
3D Computer Vision: Efficient Methods and Applications (X.media.publishing)
3D Computer Vision: Efficient Methods and Applications (X.media.publishing)

This book provides an introduction to the foundations of three-dimensional computer vision and describes recent contributions to the field. Geometric methods include linear and bundle adjustment based approaches to scene reconstruction and camera calibration, stereo vision, point cloud segmentation, and pose estimation of rigid, articulated, and...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

unlimited object storage image
Result Page: 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy