 |
|
 eBay Listings That Sell For Dummies (Computer/Tech)Discover the tricks top sellers use to grab attention
Create your own unique eBay selling pages with time-tested techniques
So you know your way around eBay, but you're not getting the highest bids for your items? Maybe your listings need a makeover! Here are all the... |  |  Cryptology UnlockedCryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.
This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic... |  |  Information Retrieval for Music and MotionA general scenario that has attracted a lot of attention for multimedia information retrieval is based on the query-by-example paradigm: retrieve all documents from a database containing parts or aspects similar to a given data fragment. However, multimedia objects, even though they are similar from a structural or semantic viewpoint, often reveal... |
|
|
 |  |  CCNP ONT Official Exam Certification GuideCCNP ONT Official Exam Certification Guide is an excellent self-study resource for the 642-845 ONT exam. Passing the exam certifies that the successful candidate has important knowledge and skills in optimizing and providing effective QoS techniques for converged networks. Passing the exam is one of the requirements for the Cisco Certified Network... |  |  Security Power ToolsWhat if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security... |
|
|
| Result Page: 383 382 381 380 379 378 377 376 375 374 373 372 371 370 369 368 367 366 365 |