Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Chips, Clones, and Living Beyond 100: How Far Will the Biosciences Take Us?
Chips, Clones, and Living Beyond 100: How Far Will the Biosciences Take Us?
"A stimulating and exciting look at how we got to the present state of health care and where we can potentially go. A unique perspective and a great read." David Lester, Ph.D., President, ITHW Inc.; formerly Director, Human Health Technologies, Pfizer Inc. "The explosion of new knowledge in the biosciences will raise important...
The Male Patient in Aesthetic Medicine
The Male Patient in Aesthetic Medicine

The demand for cosmetic procedures by male patients has increased in recent years. With this trend has come the realization that male aesthetic needs are different from female aesthetic needs. This book is the first hands-on guide dedicated exclusively to the aesthetic treatment of the male patient, and provides cosmetic surgeons with important...

The Michael Chekhov Handbook: For the Actor
The Michael Chekhov Handbook: For the Actor

'Petit's words go right to the heart of Chekhov's technique ... Anyone looking for a key to understanding more about Michael Chekhov's technique will devour it.' – Jessica Cerullo, Michael Chekhov Association, NYC

The Michael Chekhov technique is today seen as one of the most influential and inspiring...

Leading at a Higher Level, Revised and Expanded Edition: Blanchard on Leadership and Creating High Performing Organizations
Leading at a Higher Level, Revised and Expanded Edition: Blanchard on Leadership and Creating High Performing Organizations

"Leading at a Higher Level makes clear that respect and integrity aren’t pleasant-sounding options; they are essential criteria for an organization’s survival. As inspiring as it is instructive, this book belongs in every leader’s core curriculum."

...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Enterprise Architecture at Work: Modelling, Communication and Analysis (The Enterprise Engineering Series)
Enterprise Architecture at Work: Modelling, Communication and Analysis (The Enterprise Engineering Series)
Many stakeholders within and outside the company can be identified, ranging from top-level management to software engineers. Each stakeholder requires specific information presented in an accessible way, to deal with the impact of such wide-ranging developments. To predict the effects of such developments and modifications of an...
Database Programming Languages: 12th International Symposium, DBPL 2009, Lyon, France, August 24, 2009, Proceedings (Lecture Notes in Computer Science)
Database Programming Languages: 12th International Symposium, DBPL 2009, Lyon, France, August 24, 2009, Proceedings (Lecture Notes in Computer Science)
This volume contains the proceedings of the 12th International Symposium on Database Programming Languages (DBPL 2009), held in Lyon, France on - gust 24, 2009,and co-locatedwith VLDB (the International Conference on Very Large Data Bases). DBPL continues to present high-quality work at the intersection of database and programming language...
Programming .NET Compact Framework 3.5 (2nd Edition)
Programming .NET Compact Framework 3.5 (2nd Edition)
WE FEEL PRETTY FORTUNATE. During the past three decades, we have traveled the world teaching programmers what we know. Between the two of us, we have led hundreds of classes and taught thousands of professional programmers. We enjoy working with the people who are inventing the future, andwehave been fortunate enough to have been at the cutting...
LWUIT 1.1 for Java ME Developers
LWUIT 1.1 for Java ME Developers
Writing appealing cross-device applications today in Java ME is challenging as implementation differences in fonts, layout, and menus can make your application look and behave very differently on different devices. So far, the only way out has been low-level programming with its associated complexity.

The Lightweight UI Toolkit (LWUIT),
...
Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Result Page: Previous 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy