Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing Startups: Best Blog Posts
Managing Startups: Best Blog Posts

If you want salient advice about your startup, you’ve hit the jackpot with this book. Harvard Business School Professor Tom Eisenmann annually compiles the best posts from many blogs on technology startup management, primarily for the benefit of his students. This book makes his latest collection available to the broader...

Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques for Windows 7
I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in digital forensic analysis of Windows systems. I am simply someone who has found an interest in my chosen field of employment, and a passion to dig deeper. I enjoy delving into and extending the...
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management

Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are covered in...

HTML5 Canvas
HTML5 Canvas
In the past two years, since the release of this book, usage of the HTML5 Canvas has grown by leaps and bounds. The original edition of this book was one of the first publications dedicated to the Canvas. While we were proud to get out of the gate fast, it also meant that we had to do a lot of research and exploration...
Economics for the Rest of Us: Debunking the Science that Makes Life Dismal
Economics for the Rest of Us: Debunking the Science that Makes Life Dismal

Why do contemporary economists consider food subsidies in starving countries, rent control in rich cities, and health insurance everywhere "inefficient"? Why do they feel that corporate executives deserve no less than their multimillion-dollar "compensation" packages and workers no more than their meager wages? Here is a...

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.

You will learn the basics of...

Augmented Reality: An Emerging Technologies Guide to AR
Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary form as early as the 1960’s, AR is only now becoming truly practical. Recent advances in mobile processing, coupled with an explosion in digital storage capacity, ubiquity of wireless broadband connections, mass adoption of smart phones, and...
Managing the Design Process-Concept Development: An Essential Manual for the Working Designer
Managing the Design Process-Concept Development: An Essential Manual for the Working Designer
Every aspect of business is impacted by design—from the products or services a company provides, to the various forms of communications that express these products and services, to the many environments, physical or virtual, where customers interact with these offerings. Graphic design can captivate, persuade, motivate, and delight....
Christopher Grey's Studio Lighting Techniques for Photography: Tricks of the Trade for Professional Digital Photographers
Christopher Grey's Studio Lighting Techniques for Photography: Tricks of the Trade for Professional Digital Photographers
Taking the guesswork out of lighting, this invaluable examination provides tools and techniques from an accomplished expert. The most essential principles for photo shoots are presented through lengthy image sequences, considering different finishes for reflective surfaces, types of light sources, light modifiers,...
Handbook of Discrete and Computational Geometry, Second Edition (Discrete Mathematics and Its Applications)
Handbook of Discrete and Computational Geometry, Second Edition (Discrete Mathematics and Its Applications)

While high-quality books and journals in this field continue to proliferate, none has yet come close to matching the Handbook of Discrete and Computational Geometry, which in its first edition, quickly became the definitive reference work in its field. But with the rapid growth of the discipline and the many advances made over the past seven...

Result Page: 2247 2246 2245 2244 2243 2242 2241 2240 2239 2238 2237 2236 2235 2234 2233 2232 2231 2230 2229 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy