AutoCAD is the leading software tool for creating technical and architectural drawings, but it definitely doesn't lead in the «easy to master» category. That's why there's AutoCAD and AutoCAD LT All-in-One Desk Reference For Dummies—the perfect...
With AutoCAD 2006 and AutoCAD LT 2006, Autodesk has added enhancements to drafting functions, the interface, tables, and more. AutoCAD 2006 and AutoCAD LT 2006: No Experience Required is the perfect step-by-step introduction to the world's...
Do you own a TI-89, TI-89 Titanium, TI-92 Plus, or a Voyage 200 graphing calculator? If you do, or if you need to get one for school or your job, then you need to know how it works and how to make the most of its functions. TI-89 For Dummies is...
Candidates for the Oracle Certified Associate in Oracle Database 11g need to pass Exams 1Z0-051 and 1Z0-052 to achieve their certification—this guide prepares you for taking both those exams. This two-in-one study guide covers the Oracle...
David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide...
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves,...
This is supposed to be the age of instant and constant communication, right? And if you have a business, belong to an organization, or have a cause you want to promote, a great-looking flyer or brochure can say a lot. If you have Microsoft...
A must-have guide for all companies undertaking service-oriented architecture (SOA) and IT governance Service-Oriented Architecture Governance for the Services Driven Enterprise expertly covers the business, organizational, process, compliance,...
Would you order a multi-course gourmet buffet and just eat salad? If you have a TI-83 Plus graphing calculator, you have a veritable feast of features and functions at your fingertips, but chances are you don’t take full advantage of them. This...
Real World Scenarios for Practical Insights into the Field of Purchasing and Supply Management Whether you're a purchasing or supply management professional seeking to validate the skills and knowledge acquired through years of practical...
"If you're an architect looking to get the most out of Photoshop, look no further! Enhancing CAD Drawings with Photoshop is a killer book." —George Omura, Author, Mastering AutoCAD 2005 and AutoCAD LT 2005 Bring Your CAD Drawings to Life Using...
AutoCAD 2007 is a premiere computer-aided designing program that lets you organize the objects you draw, their properties, and their files. It also helps you create great-looking models. But it’s not always easy to figure out how to perform...
This interesting guide covers all aspects of Google Earth, the freely downloadable application from Google that allows users to view satellite images from all points of the globe Aimed at a diverse audience, including casual users who enjoy air...
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic...
Shows how to use the leading technical drawing software-AutoCAD-and its less-expensive sister product, AutoCAD LT, in the friendly, easy-to-understand For Dummies style Shows first-time AutoCAD users how to create precise and efficient 2-D...
Over the last few years, Adobe InDesign has made significant inroads against QuarkXPress, with adoptions by major media companies such as Meredith Corporation and Hearst Magazines; it is now the only desktop publishing program taught at many art...
Whether you're designing a network, a business plan, or an office building, Visio 2007 can transform your vision into sophisticated diagrams and drawings and this comprehensive reference shows you how. You'll discover how to use Visio for IT,...
Whether it’s your first venture into 3D technical drawing software or you’re switching to SolidWorks from something else, you’re probably excited about what this CAD program has to offer. Chances are, you figure it’s going to take awhile to get...
Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the...
The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network...
Written by one of the leading experts in content management systems (CMS), this newly revised bestseller guides readers through the confusing-and often intimidating-task of building, implementing, running, and managing a CMS Updated to cover...
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data...
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best...
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside?...
"I've been using AutoCAD for 22 years and have written a hundred books on the subject. I reviewed many CAD books back in the days when book reviews were common in CAD publications; some were innovative, others were just sad. But for nearly a...
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is...
«Изучаем Python» – это самое популярное в мире руководство по языку Python. Вы сможете не только максимально быстро его освоить, но и научитесь писать программы, устранять ошибки и создавать работающие приложения. В первой части книги вы...
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of...
Mochten Sie mit einem Roboter Handchen halten? Wie fuhlt sich das wohl an? Sind Bewusstsein und Emotionen konstruierbar – oder bleiben sie ein allein menschliches Privileg? Schon im Jahr 2015 sind PCs ahnlich leistungsfahig wie das menschliche...
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host...
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more...
Starting with an updated description of Allen's calculus, the book proceeds with a description of the main qualitative calculi which have been developed over the last two decades. It describes the connection of complexity issues to geometric...
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability....
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for...
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably...
Если вы занимаетесь веб-разработкой – от веб-клиентов до полнофункциональных одностраничных приложений, – то фреймворк Angular будет для вас просто спасением. Этот ультрасовременный инструмент полностью интегрирован со статически типизированным...
Создание микросервисов – удобная и надежная парадигма для программирования легких отказоустойчивых приложений. В этой книге подробно и интересно рассмотрены тонкости построения микросервисов на платформе .NET с применением таких популярных...
The only singular, all-encompassing textbook on state-of-the-art technical performance evaluation Fundamentals of Performance Evaluation of Computer and Telecommunication Systems uniquely presents all techniques of performance evaluation of...
Explains for the first time how «computing with words» can aid in making subjective judgments Lotfi Zadeh, the father of fuzzy logic, coined the phrase «computing with words» (CWW) to describe a methodology in which the objects of computation...
Graph partitioning is a theoretical subject with applications in many areas, principally: numerical analysis, programs mapping onto parallel architectures, image segmentation, VLSI design. During the last 40 years, the literature has strongly...
In the forthcoming years, citizens of many countries will be provided with electronic identity cards. eID solutions may not only be used for passports, but also for communication with government authorities or local administrations, as well as...
Эта книга представляет собой практическое руководство по использованию мощного инструмента (Microsoft Excel) для выполнения любой сложной задачи, например, построения финансовой модели. Кратко и внятно рассказывается об использовании электронных...
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of...
Alternative techniques and tools for analyzing biomolecular networks With the recent rapid advances in molecular biology, high-throughput experimental methods have resulted in enormous amounts of data that can be used to study biomolecular...
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more...
“Computing Networks” explores the core of the new distributed computing infrastructures we are using today: the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to...
The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identify potential research directions and technologies that will facilitate creation a global...
Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery The increased role of IT in the healthcare sector has led to the coining of a new phrase «health informatics,» which deals with the use of IT...