Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Trust and Security in Collaborative Computing (Computer and Network Security)
Trust and Security in Collaborative Computing (Computer and Network Security)
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group...
Investing Online For Dummies
Investing Online For Dummies

Expert online investing advice that you can take to the bank! Want to take firm control of your investments and reach your financial goals, but baffled by the dizzying array of online tools? Start with this bestselling guide. Investing Online For Dummies, 8th Edition will help you build your portfolio with the latest financial management...

Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner

Build distributed applications that resolve data ownership issues when working with transactions between multiple parties

Key Features

  • Explore a perfect balance between theories and hands-on activities
  • Discover popular Blockchain use cases such as Bitcoin
  • ...
Career Warfare: 10 Rules for Building a Successful Personal Brand and Fighting to Keep It
Career Warfare: 10 Rules for Building a Successful Personal Brand and Fighting to Keep It

In Career Warfare, David F. D’Alessandro, the bestselling author of Brand Warfare, has written a business classic: an insightful and delightfully frank book about achieving professional success at a high level.

What really defines those who get ahead? Hard work and accomplishments will only get you so far. If...

Windows Home Server For Dummies (Computer/Tech)
Windows Home Server For Dummies (Computer/Tech)
If you work in an office, you probably don’t lose much sleep worrying about whether your files are safe if your PC melts down. Company IT departments handle those things for business networks. But how about all those precious photos, address lists, the family genealogy, and everything else that lives on your home network? Windows Home Server...
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Fair Management: How to Stop Ruling and Start Leading
Fair Management: How to Stop Ruling and Start Leading
Contemporary personnel management is faced with a number of challenges as work becomes increasingly digital and more flexible in terms of time. 'New Work', 'agile management' and a genuine culture of dealing with errors have revolutionised personnel management. What becomes especially apparent in this respect is that managers can...
An R and S-Plus® Companion to Multivariate Analysis (Springer Texts in Statistics)
An R and S-Plus® Companion to Multivariate Analysis (Springer Texts in Statistics)

Applied statisticians often need to perform analyses of multivariate data; for these they will typically use one of the statistical software packages, S-Plus or R. This book sets out how to use these packages for these analyses in a concise and easy-to-use way, and will save users having to buy two books for the job. The author is...

Your Money or Your Life
Your Money or Your Life
I try not to distinguish between business news and general news. To me, the two are the same . . .

Over the quarter century I've been doing this -- first in print, then in broadcasting, then in print and broadcasting -- I'm amazed at how many people seem to believe that if it's about Wall Street, it's not about Main Street.

I think...

Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web...
Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security
Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.

The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by...

Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
These proceedings contain the papers selected for presentation at the 17th Smart Card Research and Advanced Applications Conference (CARDIS 2018), which was held in Montpellier, France, during November 12–14, 2018, and organized by the Montpellier Laboratory of Informatics, Robotics and Microelectronics (LIRMM)....
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy