Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Forensics JumpStart
Computer Forensics JumpStart

Launch Your Career in Computer Forensics—Quickly and Effectively

Written by a team of computer forensics experts, Computer Forensics JumpStart provides all the core information you need to launch your career in this fast-growing field:

  • Conducting a computer forensics investigation
  • ...
eXtreme .NET : Introducing eXtreme Programming Techniques to .NET Developers
eXtreme .NET : Introducing eXtreme Programming Techniques to .NET Developers

eXtreme .NET shows developers and team leaders how to incorporate eXtreme programming (XP) practices with .NET-connected technologies to create high quality, low-cost code that will build better software. This practical, realistic guidebook systematically covers...

Adobe Photoshop Elements 3 in a Snap (Sams Teach Yourself)
Adobe Photoshop Elements 3 in a Snap (Sams Teach Yourself)

These days, nobody really wants to learn everything there is about a software product like Photoshop Elements. And even if you did, who has the time to endlessly tinker and play with it until you figure everything out?

You just want a book that will quickly show you how to...

Open-Source Robotics and Process Control Cookbook : Designing and Building Robust, Dependable Real-time Systems
Open-Source Robotics and Process Control Cookbook : Designing and Building Robust, Dependable Real-time Systems
In this practical reference, popular author Lewin Edwards shows how to develop robust, dependable real-time systems for robotics and other control applications, using open-source tools. It demonstrates efficient and low-cost embedded hardware and software design techniques, based on Linux as the development platform and operating system and the...
Trusted Computing Platforms: Design and Applications
Trusted Computing Platforms: Design and Applications
Many scenarios in modern computing give rise to a common problem: why
should Alice trust computation that’s occurring at Bob’s machine? (The computer
security field likes to talk about “Alice” and “Bob” and protection against
an “adversary” with certain abilities.) What if Bob, or
...
Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces...
Microsoft Word 2004 for Mac OS X (Visual QuickStart Guide)
Microsoft Word 2004 for Mac OS X (Visual QuickStart Guide)
Sure, you were happy when the first Mac OS X-compatible version of Word arrived (after all, it's the one software program you can't live without). But this is the version you've really been waiting for. In contrast to Word for Mac OS X-which gelled nicely with the new OS but didn't offer much compelling additional...
Passionate Engines: What Emotions Reveal about the Mind and Artificial Intelligence
Passionate Engines: What Emotions Reveal about the Mind and Artificial Intelligence
In this unique contribution to philosophical debate, Craig DeLancey shows that our best understanding of emotion provides essential insight on key issues in philosophy of mind and artificial intelligence. DeLancey offers us a bold new approach to the study of the mind based on the latest scientific research, and provides an accessible overview of...
The Executive Guide to Information Security: Threats, Challenges, and Solutions
The Executive Guide to Information Security: Threats, Challenges, and Solutions

The book provides a pragmatic approach to evaluating security at a companyand putting together an effective information security program. The bookfocuses on three key themes; People, Processes, and Technology and isorganized according to the steps executives would follow in order to developan information security program for their company....

How to Make it Big in the Seminar Business
How to Make it Big in the Seminar Business

How to Make It Big in the Seminar Business is considered must have reading among consultants, speakers, and seminar leaders. Fully updated and revised, this new edition is packed with insider tips on determining fees, marketing, scheduling, presentation technologies, and much more. It features new chapters on using the Web and other...

Business Case for Network Security : Advocacy, Governance, and ROI, The (Network Business)
Business Case for Network Security : Advocacy, Governance, and ROI, The (Network Business)

The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments....

Learning GNU Emacs, Third Edition
Learning GNU Emacs, Third Edition

The third edition of Learning GNU Emacs describes Emacs 21.3 from the ground up, including new user interface features such as an icon-based toolbar and an interactive interface to Emacs customization. A new chapter details how to install and run Emacs on Mac OS X, Windows, and Linux, including tips for using...

Result Page: Previous 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy