Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Writing Effectively Super Series, Fourth Edition (ILM Super Series)
Writing Effectively Super Series, Fourth Edition (ILM Super Series)

With forty well structured and easy to follow topics to choose from, each workbook has a wide range of case studies, questions and activities to meet both an individual or organization's training needs. Whether studying for an ILM qualification or looking to enhance the skills of your employees, Super Series provides essential solutions,...

Internet Security: Cryptographic Principles, Algorithms and Protocols
Internet Security: Cryptographic Principles, Algorithms and Protocols
Cryptography is the key to securing the Internet

If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important...

Six Modern Plagues and How We Are Causing Them
Six Modern Plagues and How We Are Causing Them

"In a clear, engaging style, Dr. Walters tells the tale of each disease like a detective story. He allows each mystery to unfold as it did in reality, often slowly, through the lives of the plants and animals involved, the first human victims, the government officials who tried to respond, and the scientists who ultimately explained what...

The Big Bing: Black Holes of Time Management, Gaseous Executive Bodies, Exploding Careers, and Other Theories on the Origins of the Business Universe
The Big Bing: Black Holes of Time Management, Gaseous Executive Bodies, Exploding Careers, and Other Theories on the Origins of the Business Universe

For twenty years, Stanley Bing has offered insight, wisdom, and advice from inside the belly of one of the great corporate beasts. In one essential volume, here is all you need to know to master your career, your life, and, when necessary, other weaker life forms.

Bing knows whereof he speaks. He has lived...

Fundamentals of Computer Security
Fundamentals of Computer Security

This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key...

Incident Response: Computer Forensics Toolkit
Incident Response: Computer Forensics Toolkit
Your in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks

Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer...

Embedded Control Systems in C/C++: An Introduction for Software Developers Using MATLAB
Embedded Control Systems in C/C++: An Introduction for Software Developers Using MATLAB

Implement proven design techniques for control systems without having to master any advanced mathematics. Using an effective step-by-step approach, this book presents a number of control system design techniques geared toward readers of all experience levels. Mathematical derivations are avoided, thus making the methods accessible to developers...

Enterprise Integration Patterns : Designing, Building, and Deploying Messaging Solutions
Enterprise Integration Patterns : Designing, Building, and Deploying Messaging Solutions
  • Would you like to use a consistent visual notation for drawing integration solutions? Look inside the front cover.

  • Do you want to harness the power of asynchronous systems without getting caught in the pitfalls? See "Thinking Asynchronously" in the...

Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices
Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices

"The potential impact of this book cannot be overstressed. Software systems that are not continually and adequately evolved and, in particular, legacy systems that have not been so maintained, can threaten an organization's very survival. I recommend the book as a must for people directly involved in such evolution,...

Probability and Schrodinger's Mechanics
Probability and Schrodinger's Mechanics

The presentation and interpretation of (non-relativistic) quantum mechanics is a very well-worked area of study; there have to be very good reasons for adding to the literature on this subject.

My reasons are (obviously) that I am far from satisfied with much of the published work and find difficulties with some points, in
...

J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

Memory as a Programming Concept in C and C++
Memory as a Programming Concept in C and C++

The overwhelming majority of program bugs and computer crashes stem from problems of memory access, allocation, or deallocation. Such memory-related problems are also notoriously difficult to debug. Yet the role that memory plays in C and C++ programming is a subject often overlooked in courses and books because it requires specialized knowledge...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy