Home | Amazing | Today | Tags | Publishers | Years | Search 
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...
Building Websites with Joomla! 1.5 Beta 1
Building Websites with Joomla! 1.5 Beta 1
More than a year has passed since the founding of the Joomla! project. And what an exciting year it has been!

The Joomla! team was organized and has built a solid foundation; it has continued developing Joomla! 1.0.0 to version 1.0.12, and now has the largest developmental leap so far to Joomla! 1.5 in sight. The users of the system have
...
Information Modelling and Knowledge Bases XVIII:  Volume 154 Frontiers in Artificial Intelligence and Applications
Information Modelling and Knowledge Bases XVIII: Volume 154 Frontiers in Artificial Intelligence and Applications
In the last decades information modelling and knowledge bases have become hot topics not only in academic communities related to information systems and computer science but also in business areas where information technology is applied.

The 16th European-Japanese Conference on Information Modelling and Knowledge Bases EJC 2006 continues
...
General Theory of Information Transfer and Combinatorics (Lecture Notes in Computer Science)
General Theory of Information Transfer and Combinatorics (Lecture Notes in Computer Science)
This book constitutes the thoroughly refereed research papers contributed to a research project on the `General Theory of Information Transfer and Combinatorics' that was hosted from 2001-2004 at the Center for Interdisciplinary Research (ZIF) of Bielefeld University and also papers of several incorporated meetings thereof.

The 63 revised full...

A+, Network+, Security+ Exams in a Nutshell
A+, Network+, Security+ Exams in a Nutshell
A+, Network+, and Security+ certifications are recognized throughout the industry as the standard for proving foundation-level IT skill sets. A+, Network+ and Security+ Exams in a Nutshell provides exactly what experienced professionals need to pass one or all of these CompTIA certification exams. It's an all-in-one review resource that...
Professional Apache Tomcat 6 (WROX Professional Guides)
Professional Apache Tomcat 6 (WROX Professional Guides)
With this comprehensive resource, you'll uncover the ins-and-outs of installing, configuring, and running the Apache Tomcat server. This book not only provides a line-by-line analysis of configuration options, but also explores the features and capabilities of Tomcat. You'll then gain the skills to solve the type of problems that arise during all...
Formal Correctness of Security Protocols (Information Security and Cryptography)
Formal Correctness of Security Protocols (Information Security and Cryptography)
Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.

The author investigates proofs of correctness of realistic security protocols in...

The The Internal Medicine Casebook: Real Patients, Real Answers
The The Internal Medicine Casebook: Real Patients, Real Answers
The basis for an internal medicine casebook originated several years ago, born of my conviction that house staff and students are stimulated and motivated best when their learning is focused on real patients. Steps were taken, therefore, to augment the patient-oriented instruction of our house staff and students. This was...
Intelligent Data Analysis
Intelligent Data Analysis
This monograph is a detailed introductory presentation of the key classes of intelligent data analysis methods. The ten coherently written chapters by leading experts provide complete coverage of the core issues.

The first half of the book is devoted to the discussion of classical statistical issues, ranging from the basic concepts of...

Combined Scintigraphic and Radiographic Diagnosis of Bone and Joint Diseases
Combined Scintigraphic and Radiographic Diagnosis of Bone and Joint Diseases

The third edition of Combined Scintigraphic and Radiographic Diagnosis of Bone and Joint Diseases has been comprehensively rewritten and rearranged. It now encompasses, in addition to the bone and joint diseases described in the two earlier editions, hitherto unpublished novel applications of pinhole scanning to the diagnosis of a broader...

Navigational Surgery of the Facial Skeleton
Navigational Surgery of the Facial Skeleton

Computer-assisted techniques in the surgery of the facial skeleton including the skull base are depicted for the very first time in this atlas of navigational surgery. Experienced surgeons as well as trainees will benefit from the detailed and well-illustrated information on the use of computer technology in clinical routine, accompanied by...

Modern Phytomedicine: Turning Medicinal Plants into Drugs
Modern Phytomedicine: Turning Medicinal Plants into Drugs

This timely and original handbook paves the way to success in plant-based drug development, systematically addressing the issues facing a pharmaceutical scientist who wants to turn a plant compound into a safe and effective drug. Plant pharmacologists from around the world demonstrate the potentials and pitfalls involved, with many of the...

Result Page: Previous 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy