Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Ataxia Disorders (Neurological Disease and Therapy)
Handbook of Ataxia Disorders (Neurological Disease and Therapy)

This timely reference presents, for the first time, new findings in molecular genetics that are applicable to the epidemiology, pathogenesis, neuropathology, clinical features, and management of ataxia-bridging the gap between scientific and clinical practice.
Organized by the distinctive ataxia disorders, their pathogenesis, and
...

Sencha Touch in Action
Sencha Touch in Action

Summary

Sencha Touch in Action is the definitive guide to developing applications with Sencha Touch. You'll begin with basic design principles for building great mobile applications, and then explore the features of Sencha Touch that bring those ideas to life. You'll learn how and why objects...

Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services
Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services

SS7/C7 is a signaling network and protocol that is used worldwide to bring telecommunications networks, both fixed-line and cellular, to life. Setting up phone calls, providing cellular roaming and messaging, and converged voice/data services, such as Internet Call Waiting, are only a few of the vast number of ways that...

Digital Image Processing: PIKS Inside, Third Edition.
Digital Image Processing: PIKS Inside, Third Edition.
The book is intended to be an “industrial strength” introduction to digital image
processing to be used as a text for an electrical engineering or computer science
course in the subject. Also, it can be used as a reference manual for scientists who
are engaged in image processing research, developers of image processing
...
The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing, Configuring, and Administering Microsoft Windows XP Professional, Second Edition
MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing, Configuring, and Administering Microsoft Windows XP Professional, Second Edition
Welcome to MCSE Self-Paced Training Kit (Exam 70-270): Installing, Configuring, and
Administering Microsoft Windows XP Professional, Second Edition. This book introduces
you to the Microsoft Windows XP Professional operating system and prepares
you to install, configure, and support Windows XP Professional.

You will learn
...
Linux in a Windows World
Linux in a Windows World
The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment. This book takes an in-depth look at exactly how Linux can be brought into an organization that's currently based...
Practical Perforce
Practical Perforce

When developers build software, they're able to keep track of all the different versions and all the components they use with software configuration management (SCM) systems. One of the more popular SCM products is Perforce.

Authored by Perforce's own VP of product technology, ...

MCSA/MCSE: Windows XP Professional Fast Pass
MCSA/MCSE: Windows XP Professional Fast Pass
The Perfect Preparation and Review Resource

MCSA/MCSE: Windows XP Professional Fast Pass is the streamlined tool you need to hone in on critical XP information at this key stage in the certification process (exam 70-270). The enclosed CD lets you practice, practice, practice, and
...
Information Systems: Achieving Success by Avoiding Failure
Information Systems: Achieving Success by Avoiding Failure
Despite people’s best efforts information systems are particularly prone to failure. Some systems never materialize, others appear late and/or over budget and those that are implemented often fail to deliver the promised levels of performance. The consequences of these failures affect people throughout the organization concerned and beyond,...
unlimited object storage image
Result Page: 626 625 624 623 622 621 620 619 618 617 616 615 614 613 612 611 610 609 608 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy