-
Complex Systems and Systems of Systems Engineering
Author Jean-Luc Wippler , Jean-René Ruault , Dominique Luzeaux
With the growing maturity of information and communication technologies, systems have been interconnected within growing networks, yielding new services through a combination of the system functionalities. This leads to an increasing complexity that has to be manage....
Release Date 2011/10 -
CTS-I Certified Technology Specialist-Installation Exam Guide, Second Edition, 2nd Edition
The Most Complete, Up-to-Date CTS-I Exam Study System Published with AVIXA™, CTS®-I Certified Technology Specialist-Installation Exam Guide, Second Edition provides comprehensive coverage of all exam objectives on the leading internationally recognized certification for audiovisual installation pr.... -
Digital Painting, 37 Intermediate Tricks and Techniques
Author Gary Tonge
"Make the most of your digital artwork. State-of-the-art advice from Gary Tonge, one of the world’s leading digital art pros, covers every aspect of computer-generated art—from combining a range of source material into one cohesive image to adding super realistic ef....
Release Date 2011/11 -
Author Anmol Misra , James Ransome
"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."—Dr. Dena Haritos Tsamiti....
Release Date 2013/12 -
Applying Social Tools to Learning
Author Dave Wilkins
With social learning, the whole company is part of the learning and development team. This Infoline will show you how to strategically design effective and agile social learning strategies that address the unique needs of various learning initiatives. Learn about th....
Release Date 2012/04 -
Learning Nessus for Penetration Testing
Author Himanshu Kumar
Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessmentIn DetailIT security is a vast and exciting domain, with vulnerability assessment and penet....
Release Date 2014/01 -
Digital Video Surveillance and Security
Author Anthony C. Caputo
Digital Video Surveillance & Security provides a blueprint for the IP-based electronic security system clients need, allowing security professionals to protect their client's place of business or home. The author gives detailed plans on the best camera position....
Release Date 2010/03 -
Author Henry S. Warren
"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lovers of elegant hacks, it deserves ....
Release Date 2002/07 -
Web 2.0: Principles and Best Practices
Author John Musser
Web 2.0 Principles and Best Practices
Release Date 2006/11 -
Extending Your Business to Mobile Devices with IBM Worklight
Author Susan Hanson , Leonardo Olivera , Kearan McPherson , Christian Kirsch , Hossam Kator
The mobile industry is evolving rapidly. An increasing number of mobile devices, such as smartphones and tablets, are sold every year and more people are accessing services from a mobile device than ever before. For an enterprise, this can mean that a growing number....
Release Date 2013/08 -
Deploying Zone-Based Firewalls
Author Ivan Pepelnjak
Deploying Zone-Based Firewalls (Digital Short Cut)Ivan PepelnjakISBN: 1-58705-310-1Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the groupi....
Release Date 2006/11 -
Author Vincent Liu , Bryan Sullivan
Security Smarts for the Self-Guided IT ProfessionalSecure web application from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks.This....
Release Date 2011/11 -
Author Richard Enbody , Aditya Sood
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and....
Release Date 2014/04 -
VCAP5-DCD Official Cert Guide: VMware Certified Advanced Professional 5-Data Center Design
Author Paul McSharry
The Publisher regrets that the companion CD/DVD content for this title cannot be made available Online.The VCAP5-DCD Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This....
Release Date 2013/08 -
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work
Author Anthony David Giordano
Make Information GovernanceWork: Best Practices, Step-by-Step Tasks, and Detailed DeliverablesMost enterprises recognize the crucial importance of effective information governance. However, few are satisfied with the value of their efforts to date. Information gover....
Release Date 2014/09 -
Introduction to Digital Video, 2nd Edition
Author John Watkinson
Covers the essential fundamentals of digital video: from video principles, to conversion, compression, coding, interfaces and output. Written for television professionals needing to apply digital video systems, equipment and techniques to multimedia and /or di....
Release Date 2012/09 -
Author Lloyd Kaufman
Film is a visual medium, the work of Eric Rohmer and Kevin Smith notwithstanding. It is important for a director and cinemtographer to use their VISUAL EYES in order to VISUALIZE how to make their movie most effective. Also, there is the messy business of actors. ....
Release Date 2013/04 -
Introduction to Random Signals and Applied Kalman Filtering with Matlab Exercises, 4th Edition
Author Patrick Y. C. Hwang , Robert Grover Brown
The Fourth Edition to the Introduction of Random Signals and Applied Kalman Filtering is updated to cover innovations in the Kalman filter algorithm and the proliferation of Kalman filtering applications from the past decade. The text updates both the research advan....
Release Date 2012/02 -
Author Alan Ferguson
Programme management is the coordinated organisation and implementation of a portfolio of projects and activities that help your business achieve its strategic objectives. Good programme management is the key to managing transformational change and, in today's busi....
Release Date 2014/06 -
Author Park Foreman
As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infras....
Release Date 2009/08 -
Software Engineering: A Methodical Approach
Author Elvis C. Foster
This text provides a comprehensive, but concise introduction to software engineering. It adopts a methodical approach to solving software engineering problems proven over several years of teaching, with outstanding results.The book covers concepts, principles, d....
Release Date 2014/12 -
Nessus Network Auditing, 2nd Edition
Author Russ Rogers
The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth....
Release Date 2011/10 -
Author Michael E Cohen
Have you ever had to fill out and sign a PDF-based form? Or change the date on a PDF-based flyer? Comment on a document sent around your workplace as a PDF file? Scan a document to PDF and OCR the text? Smile's PDFpen 5 can perform these and many other PDF manipula....
Release Date 2010/10 -
Enhancing Learning and Teaching Through Student Feedback in Social Sciences
Author Patricie Mertova , Chenicheri Sid Nair
This title is the second Chandos Learning and Teaching Series book that explores themes surrounding enhancing learning and teaching through student feedback. It expands on topics covered in the previous publication, and focuses on social science disciplines. The edi....
Release Date 2013/02 -
Nmap 6: Network Exploration and Security Auditing Cookbook
Author Paulino Calderon Pale
Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth.Master the power of Nmap 6Learn how the Nmap S....
Release Date 2012/11 -
Sniffer Pro Network Optimization & Troubleshooting Handbook
Author Syngress
Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro LAN Networ....
Release Date 2002/08 -
Consumer Protection in E-Retailing in ASEAN
This book examines how consumers are protected on the online marketplace in the context of ASEAN countries.While many sectors have been badly affected by the COVID-19 pandemic, e-retailing is one of the booming sectors during this period. Actually, the e-retailing sector was already booming even bef.... -
Author Ashok Mohanty , Jibitesh Mishra
Software Engineering covers both function oriented as well as object oriented (OO) approach and emphasises on emerging areas such as 'web engineering', 'software maintenance' and 'component based software engineering'. This book further includes case studies o....
Release Date 2011/07 -
Information Governance Principles and Practices for a Big Data Landscape
Author Harald Smith , Barry Rosen , Bill Plants , Ivan Milman , Tom Jesionowski , Cindy Comp
This IBM® Redbooks® publication describes how the IBM Big Data Platform provides the integrated capabilities that are required for the adoption of Information Governance in the big data landscape.As organizations embark on new use cases, such as Big Data Exploration....
Release Date 2014/03 -
Force.com: Create and Run any Application, On Demand
Author Salesforce.com
Software as a Service (SaaS), also known as on-demand computing, is changing the landscape of information technology in a profound way. By replacing locally managed stacks of networking, hardware, and software resources with an Internet-based utility, this model has....
Release Date 2007/11