Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Cheat at Managing Information Security
How to Cheat at Managing Information Security
Information security is different from many other disciplines both within mainstream
information technology and other business areas. Even though there are
now many good books on various areas, getting the breadth of knowledge
across the many subareas is still difficult, but it is essential to success.

Unlike so many
...
Project Arcade: Build Your Own Arcade Machine
Project Arcade: Build Your Own Arcade Machine
This book is a culmination of five years of research into the subject of interfacing genuine arcade controls to computers. It is a polished and portable companion to the author’s Web site, the Build Your Own Arcade Controls FAQ (BYOAC), located at www.arcadecontrols.com/. Most of the research and information for this book came from the Web,...
The J2EE Tutorial
The J2EE Tutorial

You're familiar with Java™ programming, but now it's time for you to take it to the next level and begin creating enterprise applications with the Java™ 2 Platform, Enterprise Edition (J2EE™). The J2EE™ Tutorial is the hands-on, example-driven guide that offers unparalleled technical guidance...

Microsoft Office Excel 2007: The L Line, The Express Line to Learning
Microsoft Office Excel 2007: The L Line, The Express Line to Learning
Get on the fast track to mastering Excel

Want to find success in your profession or business? Master the timesaving tools you'll need in the real world, like Excel 2007. Whether you're a student, a professional, or an entrepreneur, you can learn Excel with this start-to-finish guide. Gain solid skills as you go from station...

Introduction to AutoCAD 2008: 2D and 3D Design
Introduction to AutoCAD 2008: 2D and 3D Design
Master the art of 2D and 3D technical drawing with Alf Yarwood's comprehensive and highly practical introductory guide

Taking the reader step-by-step through the features of AutoCAD, Alf Yarwood provides a practical, structured course of work matched to the latest release of this software. After
...
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Do you really understand your online presence? Are you confident that visitors can use your website? Do you know their motivations? How do online communities perceive your company? To innovate and adapt your business quickly, you must know the answers to these questions. Complete Web Monitoring demonstrates how to measure every aspect of your web...
Windows Sysinternals Administrator's Reference
Windows Sysinternals Administrator's Reference

The Sysinternals Suite is a set of over 70 advanced diagnostic and troubleshooting utilities for the Microsoft Windows platform written by me—Mark Russinovich—and Bryce Cogswell. Since Microsoft’s acquisition of Sysinternals in 2006, these utilities have been available for free download from...

Advances in Multimedia Information Processing - PCM 2005: 6th Pacific Rim Conference on Multimedia, Jeju Island, Korea, November 11-13, 2005
Advances in Multimedia Information Processing - PCM 2005: 6th Pacific Rim Conference on Multimedia, Jeju Island, Korea, November 11-13, 2005
We are delighted to welcome readers to the proceedings of the 6th Pacific-Rim Conference on Multimedia (PCM). The first PCM was held in Sydney, Australia, in 2000. Since then, it has been hosted successfully by Beijing, China, in 2001, Hsinchu, Taiwan, in 2002, Singapore in 2003, and Tokyo, Japan, in 2004, and finally Jeju, one...
Microsoft BizTalk Server 2010 Patterns
Microsoft BizTalk Server 2010 Patterns
Microsoft BizTalk Server 2010 is an exciting platform for developing middleware and integration solutions. As our computing ecosystem moves ever further away from monolithic mainframe style applications, we find ourselves spending an ever increasing amount of time integrating existing systems. This trend continues and increases...
Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications
Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications

This publication offers and investigates efficient Monte Carlo simulation methods in order to realize a Bayesian approach to approximate learning of Bayesian networks from both complete and incomplete data. For large amounts of incomplete data when Monte Carlo methods are inefficient, approximations are implemented, such that learning remains...

Wireshark® 101: Essential Skills for Network Analysis
Wireshark® 101: Essential Skills for Network Analysis

This book is written for beginner analysts and includes 46 step-by-step labs to walk you through many of the essential skills contained herein. This book provides an ideal starting point whether you are interested in analyzing traffic to learn how an application works, you need to troubleshoot slow network performance, or determine whether a...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

unlimited object storage image
Result Page: 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy