Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
e-Business Strategies for Virtual Organizations (Computer Weekly Professional)
e-Business Strategies for Virtual Organizations (Computer Weekly Professional)
'e-Business Strategies for Virtual Organizations' enables IT managers and directors to develop and implement IT strategies and infrastructures for new models of doing business based on the Internet.

The authors provide a brief introduction to the concepts and strategic issues surrounding information warfare, managing organizational
...
Fundamentals of Global Positioning System Receivers: A Software Approach (Wiley Series in Microwave and Optical Engineering)
Fundamentals of Global Positioning System Receivers: A Software Approach (Wiley Series in Microwave and Optical Engineering)
All the expert guidance you need to understand, build, and operate GPS receivers

The Second Edition of this acclaimed publication enables readers to understand and apply the complex operation principles of global positioning system (GPS) receivers. Although GPS receivers are widely used in everyday life to aid in positioning and navigation,...

Corporate Computer Security (3rd Edition)
Corporate Computer Security (3rd Edition)
The IT security industry has seen dramatic changes in the past decades. Security breaches, data theft, cyber attacks, and information warfare are now common news stories in the mainstream media. IT security expertise that was traditionally the domain of a few experts in large organizations has now become a concern for almost...
Essential Mathematics for Games and Interactive Applications: A Programmer's Guide
Essential Mathematics for Games and Interactive Applications: A Programmer's Guide
"Even though I've worked with these systems for years, I found new ways of looking at several topics that make them easier to remember and use. For someone new to 3D programming, it is extremely usefulit gives them a solid background in pretty much every area they need to understand." Peter Lipson, Toys for Bob, Inc.

Based on
...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Cubicle Warfare: 101 Office Traps and Pranks
Cubicle Warfare: 101 Office Traps and Pranks

Get revenge on all your annoying coworkers with this guide to 101 awesome office pranks

Are your eyes beginning to glaze over from the fluorescent lights in your tiny cubicle? Have you had one too many burnt cups of coffee? Does the guy in the cube next to you insist on pencil-drumming while cranking "Hells Bells" and...

Information Resources in Toxicology, Fourth Edition
Information Resources in Toxicology, Fourth Edition
This latest version of Information Resources in Toxicology (IRT) continues a tradition established in 1982 with the publication of the first edition in presenting an extensive itemization, review, and commentary on the information infrastructure of the field. This book is a unique wide-ranging, international, annotated bibliography and compendium...
Ultimate Guide to Wilderness Living: Surviving with Nothing But Your Bare Hands and What You Find in the Woods
Ultimate Guide to Wilderness Living: Surviving with Nothing But Your Bare Hands and What You Find in the Woods
Forget reality TV stunts like eating bugs, the Ultimate Guide to Wilderness Living provides in-depth instructions and step-by-step photos of real survival skills--exactly what one needs to stay alive in the woods. The book first covers immediate needs like starting a fire, erecting temporary shelter, and finding food. Then it goes beyond other...
Color Atlas of Human Poisoning and Envenoming
Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant, or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms, such as animals,...
Securing Im and P2P Applications for the Enterprise
Securing Im and P2P Applications for the Enterprise
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of...

Organic Pollutants: An Ecotoxicological Perspective, Second Edition
Organic Pollutants: An Ecotoxicological Perspective, Second Edition
A companion to he much praised Principles of Ecotoxicology the book covers organic pollutants in greater depth and detail than has been covered in a textbook before. The first part of the book covers issues such as chemical warfare; metabolism of pollutants in animals and plants; environmental fate; and effects within ecosystems. This is followed...
Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy