Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...

Digital Nature Photography: The Art and the Science
Digital Nature Photography: The Art and the Science
Over 50,000 photographers cant be wrong! John and Barbara Gerlach finally write the book their workshop attendees have been asking for!

Digital Nature Photography is a how-to guide for photographers who want to take their work to the next level. Written by professionals with over 20 years experience, the Gerlachs reveal enlightening
...
Microsoft Office Live For Dummies (Computer/Tech)
Microsoft Office Live For Dummies (Computer/Tech)
Automate common tasks like managing projects, customers, and documents

The fun and easy way to share your data online and grow your business

Want to make Office Live work for you? Now you can get up and running quickly in all the basics with this nuts-and-bolts guide. From creating a Web site...

Milestones in Matrix Computation: The selected works of Gene H. Golub with commentaries
Milestones in Matrix Computation: The selected works of Gene H. Golub with commentaries
At a meeting in Moscow in June 2005, Gil Strang suggested that there be a collection of Gene Golub's work to highlight his many important contributions to numerical analysis. The three of us were honored to undertake this pleasant task, with publication timed for February "29", 2007, the 75th anniversary of Gene's birth.

Gene
...
The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
iPod Repair QuickSteps
iPod Repair QuickSteps
Get more life out of your iPod

Like every other electronic device, iPods break down. Until now, the prospect of repairing an iPod was daunting, if not nearly impossible for the average user. In this full-color, inexpensive guide, the owner of the fastest-growing chain of iPod repair shops in the U.S. shares the...

Harnessing Hibernate
Harnessing Hibernate
Harnessing Hibernate is an ideal introduction to the popular framework that lets Java developers work with information from a relational database easily and efficiently. Databases are a very different world than Java objects, and they often involve people with different skills and specializations. With Hibernate, bridging these two worlds is...
Video Color Correction for Non-Linear Editors: A Step-by-Step Guide
Video Color Correction for Non-Linear Editors: A Step-by-Step Guide
Today's non-linear editing systems are equipped with a wide range of color correction tools that were previously only available in dedicated color correction suites. This book shows video editors how to take full advantage of their power. Clear, step-by-step instructions are included for Avid XPress DV, Avid Symphony, Final Cut Pro, Adobe Premiere,...
Defective Construction Work
Defective Construction Work
Defective construction work, whether the result of inadequate design, faulty workmanship or poor materials – or some combination of these failings – is a frequent cause of legal disputes. Someone is usually to blame, either the builder or one or more of the professional consultants, or even the entire project team. It is important...
Search Engine Optimization for Flash: Best practices for using Flash on the web
Search Engine Optimization for Flash: Best practices for using Flash on the web

Some people believe that because search engines can't index all of the content in SWF files, Flash-based websites and Rich Internet Applications don't show up in web searches. This breakthrough book dispels that myth by demonstrating precisely what you can do to make your site fully searchable no matter how much Flash it...

Clinical Data-Mining: Integrating Practice and Research (Pocket Guides to Social Work Research Methods)
Clinical Data-Mining: Integrating Practice and Research (Pocket Guides to Social Work Research Methods)

Clinical Data-Mining (CDM) involves the conceptualization, extraction, analysis, and interpretation of available clinical data for practice knowledge-building, clinical decision-making and practitioner reflection. Depending upon the type of data mined, CDM can be qualitative or quantitative; it is generally retrospective, but may be...

unlimited object storage image
Result Page: 795 794 793 792 791 790 789 788 787 786 785 784 783 782 781 780 779 778 777 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy