Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Research on Public Information Technology

Buy
The use of information technology in the public sector has been an increasingly prominent international trend. With this rapid expansion comes many issues, challenges, and concerns relating to the application of public information technology.

The Handbook of Research of Public Information Technology compiles estimable research on the global trend toward the rapidly increasing use of information technology in the public sector, discussing such issues as e-government and e-commerce; project management and information technology evaluation; system design and data processing; security and protection; and privacy, access, and ethics of public information technology.

(HTML tags aren't allowed.)

The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science (Interactive Technologies)
HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science (Interactive Technologies)
In the field of human-computer interaction (HCI), researchers and practitioners from diverse disciplines in the social sciences, information technology, engineering, and computer science all strive to improve the relationship, or interface, between person and machine. The multidisciplinary tradition of HCI certainly has enriched its development....
Clinical Algorithms in General Surgery: A Practical Guide
Clinical Algorithms in General Surgery: A Practical Guide
As the field of general surgery continues to expand, the diagnostic and therapeutic pathways are becoming more complex.  The diagnostic modalities available to the clinician can be both very helpful but also overwhelming considering the findings can often determine the scope of treatment for a patient.  

...

Guerilla Data Analysis Using Microsoft Excel
Guerilla Data Analysis Using Microsoft Excel
This book includes step-by-step examples and case studies that teach users the many power tricks for analyzing data in Excel. These are tips honed by Bill Jelen, “MrExcel,” during his 10-year run as a financial analyst charged with taking mainframe data and turning it into useful information quickly. Topics include perfectly sorting...
Superconductivity
Superconductivity

What is superconductivity? How was it discovered? What are the properties of superconductors, how are they applied now, and how are they likely to become widely used in the near future? These are just some of the questions which this important book sets out to answer. Starting with the discovery of superconductivity over ninety years ago, the...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy