Taken (2017) | Julie Khaner | Littérature française
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

CEH v9: Certified Ethical Hacker Version 9 Practice Tests
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

Master CEH v9 and identify your weak spots

CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain...

Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)

This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...

System Requirements Analysis, Second Edition
System Requirements Analysis, Second Edition

System Requirements Analysis gives the professional systems engineer the tools to set up a proper and effective analysis of the resources, schedules and parts needed to successfully undertake and complete any large, complex project. This fully revised text offers readers the methods for rationally breaking down a large project into a...

Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Government Data Centers: Meeting Increasing Demands
Government Data Centers: Meeting Increasing Demands
As repositories of the nation’s environmental data, U.S. government data centers are constantly evolving. The data they collect, disseminate, and archive are critical to assessing the state of the earth and our effect on it. As the data record grows, so does our understanding of the environment. However, because of the increasing amount and...
Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

System Analysis, Design, and Development : Concepts, Principles, and Practices
System Analysis, Design, and Development : Concepts, Principles, and Practices
Learn to develop systems that meet customer needs and organizational objectives

Successful system development requires formulation and implementation of a sound technical strategy that accurately translates the user's operational needs into a physical solution to comply with their specifications and contract requirements. System Analysis,...

Numerical Linear Approximation in C (CRC Numerical Analysis & Scientific Computing)
Numerical Linear Approximation in C (CRC Numerical Analysis & Scientific Computing)
Illustrating the relevance of linear approximation in a variety of fields, Numerical Linear Approximation in C presents a unique collection of linear approximation algorithms that can be used to analyze, model, and compress discrete data. Developed by the lead author, the algorithms have been successfully applied to several...
Mobile WiMAX (Wiley - IEE)
Mobile WiMAX (Wiley - IEE)

With the wide and rapid deployment of wireless LANs technology, WiMAX is an emerging technology in wireless communication and is one of the hottest subjects in wireless communications.

Mobile WiMAX is based on selected papers and plenary speeches from the 2007 IEEE Mobile WiMAX Symposium, this book provides...

Professional Issues in Software Engineering
Professional Issues in Software Engineering

It is widely recognized that a professional engineer needs to be aware of a range of issues much wider than the mere technical knowledge necessary to practice the chosen engineering discipline. The Engineering Council, for example, requires that the formation of a professional engineer should include, amongst other things,

...

Complete MBA For Dummies (Business & Personal Finance)
Complete MBA For Dummies (Business & Personal Finance)
"with this friendly guide, everyone can sample the benefits of an MBA education in a fraction of the time and at much less cost" (Business a.m., 5 November 2002)

Want to get an MBA? The Complete MBA For Dummies, 2nd Edition, is the practical, plain-English guide that covers all the basics of a
...
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy