Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

Korea's Online Gaming Empire
Korea's Online Gaming Empire

Too often I hear people say ‘ South Korea ’ and ‘ emerging market ’ in the same sentence, ” said Rich Wickham, the global head of Microsoft ’ s Windows games business. “ When it comes to gaming, Korea is the developed market, and it ’ s the rest of the world that ’ s playing...

Development of Multimodal Interfaces: Active Listening and Synchrony: Second COST 2102 International Training School
Development of Multimodal Interfaces: Active Listening and Synchrony: Second COST 2102 International Training School
This volume brings together, through a peer-revision process, the advanced research results obtained by the European COST Action 2102: Cross-Modal Analysis of Verbal and Nonverbal Communication, primarily discussed for the first time at the Second COST 2102 International Training School on “Development of Multimodal...
Coverage Control in Sensor Networks (Computer Communications and Networks)
Coverage Control in Sensor Networks (Computer Communications and Networks)

This easy-to-read text focuses on challenges in coverage control in sensor networks, examines fundamental coverage problems, and presents the most recent advances and techniques in the field. Features: provides an introduction to sensors, sensor nodes, sensor networks, and sensor coverage models; supplies an informal definition and taxonomy for...

Human Genome Epidemiology, 2nd Edition
Human Genome Epidemiology, 2nd Edition

The first edition of Human Genome Epidemiology, published in 2004, discussed how the epidemiologic approach provides an important scientific foundation for studying the continuum from gene discovery to the development, applications and evaluation of human genome information in improving health and preventing disease. Since that time,...

Adobe Flex 4: Training from the Source, Volume 1
Adobe Flex 4: Training from the Source, Volume 1

Adobe Flex: Training from the Source is the best-selling and most trusted resource for learning about Adobe Flex. Written by a team of authors with practical experience as consultants, mentors and developers of courseware, this book/CD uses project-based tutorials, and is designed to teach beginning Flex developers the details of building and...

Test-Driven JavaScript Development (Developer's Library)
Test-Driven JavaScript Development (Developer's Library)

For JavaScript developers working on increasingly large and complex projects, effective automated testing is crucial to success. Test-Driven JavaScript Development is a complete, best-practice guide to agile JavaScript testing and quality assurance with the test-driven development (TDD) methodology. Leading agile JavaScript...

Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Canvas Pocket Reference: Scripted Graphics for HTML5
Canvas Pocket Reference: Scripted Graphics for HTML5

The Canvas element is a revolutionary feature of HTML5 that enables powerful graphics for rich Internet applications, and this pocket reference provides the essentials you need to put this element to work. If you have working knowledge of JavaScript, this book will help you create detailed, interactive, and animated graphics -- from...

Wirelessness: Radical Empiricism in Network Cultures
Wirelessness: Radical Empiricism in Network Cultures

Motion, to take a good example, is originally a turbid sensation, of which the native shape is perhaps best preserved in the phenomenon of vertigo. (James 1996a, 62)

Between 1999 and 2009, a “ turbid ” or disordered sensation of change was felt as wireless connections expanded and eroded the edges of the Internet...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

SAP NetWeaver Business Warehouse: Administration and Monitoring
SAP NetWeaver Business Warehouse: Administration and Monitoring

This book offers a complete understanding of all administration tasks that arise in a live SAP NetWeaver BW system and provides guidance on ways to solve any problems that might occur. Coverage includes all topics relevant to administration and monitoring of SAP NetWeaver BW, including basic principles, tasks, analysis, and...

unlimited object storage image
Result Page: Previous 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy