Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Photographing Yosemite Digital Field Guide
Photographing Yosemite Digital Field Guide

I am excited to share my photographic knowledge of Yosemite National Park with all who seek it. In this book, I guide you to 29 of Yosemite’s most photogenic locations in alphabetical order. For each location, I tell you where the landmark is located, where to get the best image, when to get the best image, and what equipment...

Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing
Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing

This book and its companion volume, LNCS vols. 6145 and 6146, constitute the proceedings of the International Conference on Swarm Intelligence (ICSI 2010) held in Beijing, the capital of China, during June 12-15, 2010. ICSI 2010 was the first gathering in the world for researchers working on all aspects of swarm intelligence, and...

Data Analysis and Decision Making
Data Analysis and Decision Making
With today’s technology, companies are able to collect tremendous amounts of data with relative ease. Indeed, many companies now have more data than they can handle. However, the data are usually meaningless until they are analyzed for trends, patterns, relationships, and other useful information. This book...
Clutch: Why Some People Excel Under Pressure and Others Don't
Clutch: Why Some People Excel Under Pressure and Others Don't
Is clutch performance innate-or can it be learned? 

Sooner or later everyone encounters a situation in which the stakes are high and the outcome is crucial. And even top performers can crumble when faced with such extreme pressure. Consider the CEO who panics in a desperate attempt to shore up his...

Implementing Word of Mouth Marketing: Online Strategies to Identify Influencers, Craft Stories, and Draw Customers
Implementing Word of Mouth Marketing: Online Strategies to Identify Influencers, Craft Stories, and Draw Customers

Learn to capitalize on online word of mouth, leverage its power, and measure results of your initiatives

Savvy, strategic, and right on time, Implementing Word of Mouth Marketing is the essential guide for any company or organization needing to understand the dynamics of online word of mouth. This powerful book will coach...

Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)
Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)

At DART'09, held in conjunction with the 2009 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2009) and Intelligent Agent Technology (IAT 2009) in Milan (Italy), practitioners and researchers working on pervasive and intelligent access to web services and distributed information retrieval met to compare their work ad...

Lean Integration: An Integration Factory Approach to Business Agility
Lean Integration: An Integration Factory Approach to Business Agility

Use Lean Techniques to Integrate Enterprise Systems Faster, with Far Less Cost and Risk

 

By some estimates, 40 percent of IT budgets are devoted to integration. However, most organizations still attack integration on a project-by-project basis,...

Beginning ASP.NET 4 in C# 2010
Beginning ASP.NET 4 in C# 2010

The most up-to-date and comprehensive introductory ASP.NET book you’ll find on any shelf, Beginning ASP.NET 4 in C# 2010 guides you through Microsoft’s latest technology for building dynamic web sites. This book will enable you to build dynamic web pages on the fly, and assumes only the most basic knowledge of C#.

...
Data Management for Multimedia Retrieval
Data Management for Multimedia Retrieval

Multimedia data require specialized management techniques because the representations of color, time, semantic concepts, and other underlying information can be drastically different from one another. The user's subjective judgment can also have significant impact on what data or features are relevant in a given context. These factors...

Verification of Sequential and Concurrent Programs (Texts in Computer Science)
Verification of Sequential and Concurrent Programs (Texts in Computer Science)

This widely anticipated third edition provides a systematic exploration of one of the most common approaches to program verification, known as the assertional approach. This approach is applied to deterministic and nondeterministic sequential programs of varying complexity, together with both parallel and distributed concurrent programs. The...

High Performance Computing: Programming and Applications (Chapman & Hall/CRC Computational Science)
High Performance Computing: Programming and Applications (Chapman & Hall/CRC Computational Science)

The future of high-performance computing (HPC) lies with large distributed parallel systems with three levels of parallelism, thousands of nodes containing MIMD* groups of SIMD* processors. For the past 50 years, the clock cycle of single processors has decreased steadily and the cost of each processor has decreased. Most applications would...

unlimited object storage image
Result Page: Previous 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy