Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Filmmaking For Dummies (Career/Education)
Filmmaking For Dummies (Career/Education)
"I found Filmmaking For Dummies a thorough and informative read: a complete A to Z that demystifies not only production, but pre- and post- production as well. Stoller paints a picture of filmmaking so basic that you'd have to be not just a dummy but completely braindead if you're unable to make your own movie after closing the...
Frommer's Kauai (Frommer's Complete)
Frommer's Kauai (Frommer's Complete)
On any list of the world’s most spectacular islands, Kauai ranks right up there with Bora Bora, Huahine, and Rarotonga. All the elements are here: moody rainforests, majestic cliffs, jagged peaks, emerald valleys, palm trees swaying in the breeze, daily rainbows, and some of the most spectacular golden beaches you’ll find...
SOA Modeling Patterns for Service Oriented Discovery and Analysis
SOA Modeling Patterns for Service Oriented Discovery and Analysis

One of the most challenging tasks in today’s business and information technology (IT) environments is to communicate a solution to an organizational problem in a simple manner that can be easily understood by business and IT personnel alike. Is it also arduous to explain in simple words how a remedy to an enterprise concern can be...

The Secret: What Great Leaders Know and Do
The Secret: What Great Leaders Know and Do
Written by the legendary bestselling author Ken Blanchard, The Secret (over 100,000 copies sold) answers a question most leaders ask at some point in their career, ?What do I need to do to be a great leader??...
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Mathematics for Computer Graphics
Mathematics for Computer Graphics
Baffled by maths? Then don't give up hope. John Vince will show you how to understand many of the mathematical ideas used in computer animation, virtual reality, CAD, and other areas of computer graphics. In thirteen chapters you will rediscover - and hopefully discover for the first time a new way of understanding - the mathematical techniques...
Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Behold a Pale Horse
Behold a Pale Horse
Sometime ago I had the opportunity to meet William Cooper and his wife Annie. It was part of my job to verify whether this man did indeed speak the truth or was just another person seeking fame and fortune. What I found was a rugged, bulldog, driven individual who was kind, thoughtful and tenderhearted. He was truly concerned about you and your...
Protecting Your Mobile App IP: The Mini Missing Manual
Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...

The Driver: My Dangerous Pursuit of Speed and Truth in the Outlaw Racing World
The Driver: My Dangerous Pursuit of Speed and Truth in the Outlaw Racing World

On his deathbed, Alex Roy's father dropped tantalizing hints about the notorious Cannonball Run of the 1970s, the utterly illegal high-speed nonstop race from New York to L.A. that was nothing at all like the one portrayed in the Burt Reynolds movie.

Inspired by his father's dying words, and against the advice of his loyal,...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy