Author:
Publisher:
ISBN: 9780028047690
Category : Electronic data processing
Languages : en
Pages : 212
Book Description
Corel WordPerfect 8.0 Manual for Gregg College Keyboarding & Document Processing for Windows
Author:
Publisher:
ISBN: 9780028047690
Category : Electronic data processing
Languages : en
Pages : 212
Book Description
Publisher:
ISBN: 9780028047690
Category : Electronic data processing
Languages : en
Pages : 212
Book Description
Corel WordPerfect 7.0 Manual for Gregg College Keyboarding & Document Processing for Windows
Author:
Publisher:
ISBN: 9780028032726
Category : Electronic data processing
Languages : en
Pages : 212
Book Description
Publisher:
ISBN: 9780028032726
Category : Electronic data processing
Languages : en
Pages : 212
Book Description
Subject Guide to Books in Print
Author:
Publisher:
ISBN:
Category : American literature
Languages : en
Pages : 3054
Book Description
Publisher:
ISBN:
Category : American literature
Languages : en
Pages : 3054
Book Description
Principles of Information Systems
Author: Ralph Stair
Publisher: Cengage Learning
ISBN: 9780324665284
Category : Computers
Languages : en
Pages : 652
Book Description
Now thoroughly streamlined and revised, PRINCIPLES OF INFORMATION SYSTEMS, Ninth Edition, retains the overall vision and framework that made the previous editions so popular while eliminating outdated topics and updating information, examples, and case studies. In just 600 pages, accomplished authors Ralph Stair and George Reynolds cover IS principles and their real-world applications using timely, current business examples and hands-on activities. Regardless of their majors, students can use this book to understand and practice IS principles so they can function more effectively as workers, managers, decision makers, and organizational leaders. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Publisher: Cengage Learning
ISBN: 9780324665284
Category : Computers
Languages : en
Pages : 652
Book Description
Now thoroughly streamlined and revised, PRINCIPLES OF INFORMATION SYSTEMS, Ninth Edition, retains the overall vision and framework that made the previous editions so popular while eliminating outdated topics and updating information, examples, and case studies. In just 600 pages, accomplished authors Ralph Stair and George Reynolds cover IS principles and their real-world applications using timely, current business examples and hands-on activities. Regardless of their majors, students can use this book to understand and practice IS principles so they can function more effectively as workers, managers, decision makers, and organizational leaders. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Managing Information Technology
Author: Carol V Brown
Publisher: Pearson Education (Us)
ISBN: 9780131789609
Category :
Languages : en
Pages : 786
Book Description
For upper-level undergraduate and graduate level MIS courses.ThisMIS text gives students and active managers a thorough and practical guide to IT management practices and issues."
Publisher: Pearson Education (Us)
ISBN: 9780131789609
Category :
Languages : en
Pages : 786
Book Description
For upper-level undergraduate and graduate level MIS courses.ThisMIS text gives students and active managers a thorough and practical guide to IT management practices and issues."
Adaptive Technology for the Internet
Author: Barbara T. Mates
Publisher: ALA Editions
ISBN:
Category : Computers
Languages : en
Pages : 212
Book Description
This work demonstrates how to make electronic information resources available to people with disabilities. The authors offer advice on technologies including screen readers, Braille screens, voice recognition systems, hearing assistance devices and HTML coding for accessibility. In addition to product descriptions, they cover the infrastructure issues like funding and staff training. A listing of adaptive technology programmes in libraries around America is provided.
Publisher: ALA Editions
ISBN:
Category : Computers
Languages : en
Pages : 212
Book Description
This work demonstrates how to make electronic information resources available to people with disabilities. The authors offer advice on technologies including screen readers, Braille screens, voice recognition systems, hearing assistance devices and HTML coding for accessibility. In addition to product descriptions, they cover the infrastructure issues like funding and staff training. A listing of adaptive technology programmes in libraries around America is provided.
The Postal Record
Encyclopedia of Computer Science and Technology
Author: Harry Henderson
Publisher: Infobase Publishing
ISBN: 1438110030
Category : Computers
Languages : en
Pages : 593
Book Description
Presents an illustrated A-Z encyclopedia containing approximately 600 entries on computer and technology related topics.
Publisher: Infobase Publishing
ISBN: 1438110030
Category : Computers
Languages : en
Pages : 593
Book Description
Presents an illustrated A-Z encyclopedia containing approximately 600 entries on computer and technology related topics.
Gallery of Best Resumes
Author: David Franklin Noble
Publisher:
ISBN: 9781563709852
Category : Résumés (Employment)
Languages : en
Pages : 0
Book Description
A showcase collection of 178 outstanding resume samples with a bonus section that includes 16 resumes printed on special papers.
Publisher:
ISBN: 9781563709852
Category : Résumés (Employment)
Languages : en
Pages : 0
Book Description
A showcase collection of 178 outstanding resume samples with a bonus section that includes 16 resumes printed on special papers.
Managed Code Rootkits
Author: Erez Metula
Publisher: Elsevier
ISBN: 1597495751
Category : Business & Economics
Languages : en
Pages : 338
Book Description
Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks, which are developed in intermediate language. The initial part of the book offers an overview of managed code rootkits. It explores environment models of managed code and the relationship of managed code to rootkits by studying how they use application VMs. It also discusses attackers of managed code rootkits and various attack scenarios. The second part of the book covers the development of managed code rootkits, starting with the tools used in producing managed code rootkits through their deployment. The next part focuses on countermeasures that can possibly be used against managed code rootkits, including technical solutions, prevention, detection, and response tactics. The book concludes by presenting techniques that are somehow similar to managed code rootkits, which can be used in solving problems. - Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews - Introduces the reader briefly to managed code environments and rootkits in general - Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation - Focuses on managed code including Java, .NET, Android Dalvik and reviews malware development scanarios
Publisher: Elsevier
ISBN: 1597495751
Category : Business & Economics
Languages : en
Pages : 338
Book Description
Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks, which are developed in intermediate language. The initial part of the book offers an overview of managed code rootkits. It explores environment models of managed code and the relationship of managed code to rootkits by studying how they use application VMs. It also discusses attackers of managed code rootkits and various attack scenarios. The second part of the book covers the development of managed code rootkits, starting with the tools used in producing managed code rootkits through their deployment. The next part focuses on countermeasures that can possibly be used against managed code rootkits, including technical solutions, prevention, detection, and response tactics. The book concludes by presenting techniques that are somehow similar to managed code rootkits, which can be used in solving problems. - Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews - Introduces the reader briefly to managed code environments and rootkits in general - Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change language runtime implementation - Focuses on managed code including Java, .NET, Android Dalvik and reviews malware development scanarios