Electronic Books

Total Books: 41 - 60 /133
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

Lire la suite
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

Lire la suite
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

Lire la suite
Foundation Expression Blend 2 : Building Applications in WPF and Silverlight

This book shows you how to take full advantage of Blend's interface, together with and Silverlight's vastly improved designer-developer ...

Lire la suite
Foundation Flash CS3 Video

Video is one of the most exciting features on today's Internet, with widespread adoption being made possible by advances ...

Lire la suite
Foundation PHP for Dreamweaver 8

In this book, we look specifically at using Dreamweaver's built-in server behaviors to build dynamic web sites using PHP ...

Lire la suite
Foundation Web Design with Dreamweaver 8

Dreamweaver is Macromedia's bestselling web design/development environment. Dreamweaver has the capability to generate dynamic ...

Lire la suite
NoIMG
Fundamentals of building construction: materials and methods

Building Construction has been the go-to reference for thousands of professionals and students of architecture, engineering, ...

Lire la suite
Getting StartED with Mac OS X Leopard

This book offers a simple to read, fast way to discover all that's new in Mac OS X Leopard, and how to make the most of ...

Lire la suite
Guide to Assembly Language Programming in Linux

This unique guide provides comprehensive coverage of the key elements of Assembly language programming with in-depth coverage ...

Lire la suite
Hardening Windows

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which ...

Lire la suite
Honeypots for Windows

Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, ...

Lire la suite
Information Security and Cryptology - ICISC 2004

The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...

Lire la suite
Information Security and Privacy (vol. # 4058)

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...

Lire la suite
Integrated Circuit Test Engineering

Integrated Circuit Test Engineering provides a thorough-going and illuminating introduction to test engineering in analogue, ...

Lire la suite
Introduction to PHP for Scientists and Engineers : Beyond JavaScript

This text presents key information needed to write your own online science and engineering applications, including reading, ...

Lire la suite
Low Thermal Expansion Glass Ceramics

This book appears in the authoritative series reporting the international research and development activities conducted by ...

Lire la suite
Mac OS X Leopard : Beyond the Manual

Good computer books make assumptions about the reader: what they do and don't know when they pick up the book, and what ...

Lire la suite
Meaning in Action

are far from genetically ? xing what behavioral preferences they may possess. Instead, learning mechanisms offer a ? exible ...

Lire la suite
Microsoft Visual C# Step by Step / John Sharp

Guide to Microsoft Visual C# fundamentals with Visual Studio. Expand your expertiseand teach yourself the fundamentals of ...

Lire la suite
Total Books: 41 - 60 /133