Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Podcasting: Do It Yourself Guide
Podcasting: Do It Yourself Guide
It's your show, and you can do what you want

Got something to tell the world? Want unlimited listening options? Podcasting makes it happen. It's the hottest communication trend of the twenty-first century, and one of the first guys to jump on board is ready to get you started. Todd helps you choose software, subscribe to the best podcasts,...

Enhancing CAD Drawings with Photoshop
Enhancing CAD Drawings with Photoshop
"If you're an architect looking to get the most out of Photoshop, look no further! Enhancing CAD Drawings with Photoshop is a killer book."
George Omura, Author, Mastering AutoCAD 2005 and AutoCAD LT 2005

Bring Your CAD Drawings to Life Using Artistic Photoshop
...
Topology for Computing (Cambridge Monographs on Applied and Computational Mathematics)
Topology for Computing (Cambridge Monographs on Applied and Computational Mathematics)
Written by a computer scientist for computer scientists, this book teaches topology from a computational point of view, and shows how to solve real problems that have topological aspects involving computers. Such problems arise in many areas, such as computer graphics, robotics, structural biology, and chemistry. The author starts from the basics...
Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
Value-Based Software Engineering
Value-Based Software Engineering

The IT community has always struggled with questions concerning the value of an organization’s investment in software and hardware. It is the goal of value-based software engineering (VBSE) to develop models and measures of value which are of use for managers, developers and users as they make tradeoff decisions between, for example,...

Congenital and Perinatal Infections (Infectious Disease)
Congenital and Perinatal Infections (Infectious Disease)

A concise clinical reference that facilitates the diagnosis of intrauterine and perinatally acquired infections was the goal in creating the Congenital and Perinatal Infections: A Concise Guide to Diagnosis. Information about the natural history, m- agement, and outcome of these infections is well detailed in many other sources and so has not...

Oracle PL/SQL for DBAs
Oracle PL/SQL for DBAs

PL/SQL, Oracle's powerful procedural language, has been the cornerstone of Oracle application development for nearly 15 years. Although primarily a tool for developers, PL/SQL has also become an essential tool for database administration, as DBAs take increasing responsibility for site performance and as the lines between...

Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
802.11 WLANs and IP Networking: Security, QoS, and Mobility
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.

“How do IEEE 802.11 wireless local area networks (WLANs) work together
with the
...
Making Sense of Motherhood: A Narrative Approach
Making Sense of Motherhood: A Narrative Approach
Becoming a mother changes lives in many ways, and this book explores how women try to make sense of, and narrate their experiences of, first-time motherhood in industrialized society. It charts the social, cultural and moral contours of contemporary motherhood and engages with sociological and feminist debates on how selves are constituted,...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Result Page: Previous 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy