Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Basics of Contemporary Cryptography for IT Practitioners
Basics of Contemporary Cryptography for IT Practitioners
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques...
Quicken 2009: The Missing Manual
Quicken 2009: The Missing Manual

Quicken is a convenient way to keep track of personal finances, but many people are unaware of Quicken's power and end up using only the basic features. Sometimes Quicken raises more questions than it answers: Return of capital from stock? Net worth? What are they and why do you need to know about them? Luckily, Quicken 2009:...

jBPM5 Developer Guide
jBPM5 Developer Guide

jBPM5 is a well known open source Business Process Management System (BPMS) used for defining and executing business processes. Java developers can use jBPM5 to analyze, improve, and maintain business processes, which are integral to an organization's management. This book guides you through each level of the jBPM5 platform, allowing you...

E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks
All of the big viruses of recent times (think "Melissa" and the "Love Bug") have used e-mail protocols to propagate themselves--often taking advantage of the address-book features of e-mail clients to identify their victims. The E-mail Virus Protection Handbook explores how you, as an administrator of an e-mail server...
Sales and Distribution in SAP ERP: Practical Guide
Sales and Distribution in SAP ERP: Practical Guide
In today's competitive environment, the ability to handle business processes cost- effectively is critical. Sales and Distribution in SAP ERP (which, in this book, we'll refer to as SD) offers such a set of tools. As one of the most important and most often implemented SAP logistics functionalities, SD makes information...
Raising Capital: Get The Money You Need To Grow Your Business
Raising Capital: Get The Money You Need To Grow Your Business
Whether your business is just a gleam in your eye, a newly launched operation, or a full-fledged firm that's humming right along, you'll never experience real growth without a substantial infusion of cash. Long gone are the days when venture capital groups seemed to pour millions into every "next big thing." Now it's clear that there is...
Financial Cryptography and Data Security: 11th International Conference, FC 2007, and First International Workshop on Usable Security
Financial Cryptography and Data Security: 11th International Conference, FC 2007, and First International Workshop on Usable Security
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, FC 2007, and the co-located 1st International Workshop on Usable Security, USEC 2007, both held in Scarborough, Trinidad/Tobago, in February 2007.

The book includes 17 revised full papers, 1 system...

Digital Identity
Digital Identity

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval...

PostgreSQL: Introduction and Concepts
PostgreSQL: Introduction and Concepts
The most advanced, feature-rich SQL database server available, the open-source PostgreSQL system has rapidly become a key Internet technology. PostgreSQL: Introduction and Concepts, written by a founding member of the PostgreSQL Global Development Team, provides a much-needed tutorial and real-world guide to understanding and...
Adobe Business Catalyst: Design full-featured websites without the hassles of development
Adobe Business Catalyst: Design full-featured websites without the hassles of development
The Internet has completely transformed the way products are marketed and sold. Technology is evolving very quickly and businesses are constantly reinventing themselves. Customers want more for their money. They have learned to shop around to find the best value. They compare reviews to purchase the highest-rated items. As the...
Inventory Accounting : A Comprehensive Guide (Wiley Best Practices)
Inventory Accounting : A Comprehensive Guide (Wiley Best Practices)
The classical view of inventory data collection is that of employees filling out forms
of various kinds throughout the warehouse and production areas, which are then
forwarded to a central data entry location, where hordes of clerks keypunch the data
into a central computer database. Although this was a reasonably accurate view of...
Expert Apache Cassandra Administration
Expert Apache Cassandra Administration
Follow this handbook to build, configure, tune, and secure Apache Cassandra databases. Start with the installation of Cassandra and move on to the creation of a single instance, and then a cluster of Cassandra databases.

Cassandra is increasingly a key player in many big data environments, and this book shows you
...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy