Lucifer S03E25 | Deception 2018 S01E13 | UFC Fight Night 130 Post-fight Press Conference
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
What do Einstein's theory of relativity, string theory, and lots of other mind-bending—and space-bending—revelations of modern physics have in common? None of them could have been discovered until scientists and mathematicians recognized an uncomfortable truth—that there was a reason the world's greatest mathematical minds had...
Network Intrusion Detection (3rd Edition)
Network Intrusion Detection (3rd Edition)

Our goal in writing Network Intrusion Detection, Third Edition has been toempower you as an analyst. We believe that if you read this book cover to cover,and put the material into practice as you go, you will be ready to enter theworld of intrusion analysis. Many people have read our books, or attended ourlive class offered by SANS, and the...

Gangsterismo: The United States, Cuba and the Mafia, 1933 to 1966
Gangsterismo: The United States, Cuba and the Mafia, 1933 to 1966

"The anti-communist hysteria generated by the Cold War frequently unhinged the policy judgments of US government officials in many areas, but nowhere so completely as in our relations with Cuba. This conclusion is inescapable as Gangsterismo brilliantly unravels the bizarre tale of the Mafia army the Kennedy brothers recruited in their...

Path-Oriented Program Analysis
Path-Oriented Program Analysis
This book presents a unique method for decomposing a computer program along its execution paths, for simplifying the subprograms so produced, and for recomposing a program from its subprograms. This method enables us to divide and conquer the complexity involved in understanding the computation performed by a program by decomposing it into a set...
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
One exciting aspect of software programming is that there are usually many ways to accomplish the same goal. Unfortunately, this also presents software engineers with unique challenges when trying to make the best design or implementation choice for each situation. Experience plays a major role, and the learning...
Professional Microsoft SQL Server 2012 Integration Services
Professional Microsoft SQL Server 2012 Integration Services

THE MOST IMPORTANT BUSINESS intelligence tool in the Microsoft Swiss Army knife of tools is SQL Server Integration Services (SSIS). This is because the other tools would be nothing without the cleansing and movement of data into a presentable format. The product can extract, transform, and load (ETL) data astonishingly fast. A 2010 benchmark...

Data Structures and Algorithms in Java
Data Structures and Algorithms in Java
Fundamental data structures in a consistent object-oriented framework

Now revised to reflect the innovations of Java 5.0, Goodrich and Tamassia’s Fourth Edition of Data Structures and Algorithms in Java continues to offer accessible coverage of fundamental data structures, using a consistent...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes

Preparing for the Worst details the best practices in antiterrorism tactics and preparing for disaster. This book is for typical American families, business travelers, corporate executive management personnel, emergency first responders, school administrators, and local government officials responsible for public safety and emergency...

Persuasive Technology: Using Computers to Change What We Think and Do (The Morgan Kaufmann Series in Interactive Technologies)
Persuasive Technology: Using Computers to Change What We Think and Do (The Morgan Kaufmann Series in Interactive Technologies)
With compelling insights and illuminating examples, the author reveals how Web sites, software applications, and mobile devices can be used to change people’s attitudes and behavior.

Can computers change what you think and do? Can they motivate you to stop smoking, persuade you to buy insurance, or convince you to join the Army?

...
Nonprofit Essentials: Managing Technology
Nonprofit Essentials: Managing Technology

This book is intended to help nonprofit leaders become not only more effective as
administrators, marketers, researchers, and fundraisers, but also more responsible custodians
of limited funds.When every penny counts, computers can help to make it
possible for small, committed groups to perform the routine tasks that once...

Result Page: 11 10 9 8 7 6 5 4 3 2 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy