Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Fundamentals of ActionScript 3.0: Develop and Design
Fundamentals of ActionScript 3.0: Develop and Design

Welcome to ActionScript. Over the next several chapters, you’ll be introduced to one of the most versatile programming languages to create web applications for the browser, desktop applications, and mobile apps for multiple platforms. For years the Flash Platform has provided people with the most powerful set of...

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Contributions in Analytic and Algebraic Number Theory: Festschrift for S. J. Patterson
Contributions in Analytic and Algebraic Number Theory: Festschrift for S. J. Patterson

The text that comprises this volume is a collection of surveys and original works from experts in the fields of algebraic number theory, analytic number theory, harmonic analysis, and hyperbolic geometry. A portion of the collected contributions have been developed from lectures given at the "International Conference on the Occasion of...

Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)
Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)

Since the pioneering work of Joseph Schumpeter (1942), it has been assumed that innovations typically play a key role in firms’ competitiveness.  This assumption has been applied to firms in both developed and developing countries. However, the innovative capacities and business environments of firms in developing countries are...

ASP.NET jQuery Cookbook
ASP.NET jQuery Cookbook

The jQuery library has become increasingly popular with web application developers because of its simplicity and ease of use. The library is supported by an active community of developers and has grown significantly over the years after its inception in 2006 by John Resig. Using this library eases complicated tasks and adds to the interactive...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Human computation is a new and evolving research area that centers around harnessing human intelligence to solve computational problems that are beyond the scope of existing Artificial Intelligence (AI) algorithms. With the growth of the Web, human computation systems can now leverage the abilities of an unprecedented number of people via the...

Microsoft Windows Server Administration Essentials
Microsoft Windows Server Administration Essentials

The core concepts and technologies you need to administer a Windows Server OS

Administering a Windows operating system (OS) can be a difficult topic to grasp, particularly if you are new to the field of IT. This full-color resource serves as an approachable introduction to understanding how to install a server, the various...

Blender 2.5 Character Animation Cookbook
Blender 2.5 Character Animation Cookbook

This book offers clear, illustrative, and easy-to-follow recipes to create character rigs and animations for common situations. Bring your characters to life by understanding the principles, techniques, and approaches involved in creating rigs and animations; you'll be able to adapt them to your own characters and films.

...

Pattern Recognition and Machine Intelligence: 4th International Conference, PReMI 2011, Moscow, Russia, June 27 - July 1, 2011, Proceedings
Pattern Recognition and Machine Intelligence: 4th International Conference, PReMI 2011, Moscow, Russia, June 27 - July 1, 2011, Proceedings

This volume contains the proceedings of the 4th International Conference on Pattern Recognition and Machine Intelligence (PReMI-2011) which was held at the National Research University Higher School of Economics (HSE), Moscow, Russia, during June 27 - July 1, 2011. This was the fourth conference in the series. The first three...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Result Page: Previous 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy