Home | Amazing | Today | Tags | Publishers | Years | Search 
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Single-Sensor Imaging: Methods and Applications for Digital Cameras (Image Processing Series)
Single-Sensor Imaging: Methods and Applications for Digital Cameras (Image Processing Series)
Single-sensor camera image processing methods are becoming increasingly important due to the emergence of digital camera based applications and commercial devices. Presenting the state of the art, Single-Sensor Imaging provides comprehensive coverage of system design, implementation, and application aspects of single-sensor imaging...
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources...
Best Practices in Business Technology Management
Best Practices in Business Technology Management
A Tour de Force of Business Technology Management

Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies spend too much money on new technology, while their business models and...

Knowledge Retention: Strategies and Solutions
Knowledge Retention: Strategies and Solutions
‘‘Knowledge Retention: Strategies and Solutions will become paramount toward achieving success in an increasingly competitive environment.’’

—Jay Liebowitz

As the baby boomer generation approaches retirement age, many organizations are facing the potential
...
Information Security Management Handbook, Fourth Edition, Volume II
Information Security Management Handbook, Fourth Edition, Volume II
A wonderful supplement [to the study guide]. … [H]eavy on practical examples and real-world scenarios … . [The book is] excellent.
- Technical Support, Dec. 2004

This is a must-have book for those preparing for the CISSP exam and for any information security professional.
- Zentralblatt MATH 1054, May 2005
...
Information Security Management Handbook, Fourth Edition, Volume III
Information Security Management Handbook, Fourth Edition, Volume III
A wonderful supplement [to the study guide]. … [H]eavy on practical examples and real-world scenarios … . [The book is] excellent.
- Technical Support, Dec. 2004

This is a must-have book for those preparing for the CISSP exam and for any information security professional.
- Zentralblatt MATH 1054, May 2005
...
Leading IT Projects: The IT Manager's Guide
Leading IT Projects: The IT Manager's Guide
Senior level IT managers are responsible for a wide variety of development projects. For the most part, these individual projects are handled by project managers. However, IT managers must be conversant in the field of project management. Additionally, they must understand the dynamics of managing the project manager and be familiar with the skill...
The Video Game Theory Reader 2
The Video Game Theory Reader 2
"The Video Game Theory Reader 2" picks up where the first "Video Game Theory Reader" (Routledge, 2003) left off, with a group of leading scholars turning their attention to next-generation platforms - the Nintendo Wii, the PlayStation 3, the Xbox 360 - and to new issues in the rapidly expanding field of video games studies. The...
Computational Systems Bioinformatics: Csb2007 Conference Proceedings, University of California, San Diego, USA, 13-17 August 2007
Computational Systems Bioinformatics: Csb2007 Conference Proceedings, University of California, San Diego, USA, 13-17 August 2007
This volume contains about 40 papers covering many of the latest developments in the fast-growing field of bioinformatics. The contributions span a wide range of topics, including computational genomics and genetics, protein function and computational proteomics, the transcriptome, structural bioinformatics, microarray data analysis, motif...
Tsunamis and Hurricanes: A Mathematical Approach
Tsunamis and Hurricanes: A Mathematical Approach
"... This book is useful for researchers working in mathematical modeling  and hydrodynamics." Zentralblatt MATH 11/2007

Tsunamis and hurricanes have had a devastating impact on the population living near the coast during the year 2005. The calculation of the power and intensity of tsunamis and...

Intelligent Network Video: Understanding Modern Video Surveillance Systems
Intelligent Network Video: Understanding Modern Video Surveillance Systems
This is the first resource to provide detailed coverage of advanced digital networking and intelligent video capabilities and optimization. It addresses general concepts, explains why IP-based systems provide better image quality and more scalable and flexible systems at a lower cost, and provides current information on cameras and DVRs. It also...
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy