Privacy Protection and Computer Forensics, Second Edition This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
The Success of Open Source
Much of the innovative programming that powers the Internet, creates operating systems, and produces software is the result of "open source" code, that is, code that is freely distributed--as opposed to being kept secret--by those who write it. Leaving source code open has generated some of the most sophisticated developments in...
The Business of iOS App Development: For iPhone, iPad and iPod touch
Updated and expanded for the new Apple iOS8, The Business of iOS App Development, Third Edition shows you how to incorporate marketing and business savvy into every aspect of the design and development process, giving your app the best possible chance of succeeding in the App Store.
This book is written by experienced...
Lawyers at Work
"With probing questions and articulate answers, Cosslett and her subjects shed light on the challenges of legal practice in the current legal market." BLS Law Notes, 11.16.12
Lawyers at Work reveals what it means and what it takes to be a satisfied, sane, and successful lawyer in today’s tough...
Comprehensive Intellectual Capital Management: Step-by-Step This book marks an important stage in my professional life. In one way it may seem a digression
from my profession as an attorney, but on second thought it seems that everything that
I have been doing in the past seven years of my professional life were leading to this book. Being
a business lawyer, I came to appreciate that my...
|Result Page: 28 27 26 25 24 23 22 21 20 19 |