Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Maximum Security, Fourth Edition

Buy
Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.
(HTML tags aren't allowed.)

Noise Sources in Turbulent Shear Flows: Fundamentals and Applications (CISM International Centre for Mechanical Sciences)
Noise Sources in Turbulent Shear Flows: Fundamentals and Applications (CISM International Centre for Mechanical Sciences)

The articles in this volume present the state-of-the-art in noise prediction, modeling and measurement. The articles are partially based on class notes provided during the course `Noise sources in turbulent shear flows', given at CISM on April 2011. The first part contains general concepts of aero acoustics, including vortex sound theory...

Oracle Application Express Administration: For DBAs and Developers
Oracle Application Express Administration: For DBAs and Developers

Succeed in managing Oracle Application Express (APEX) environments. This book focuses on creating the right combination of scalability, high-availability, backup and recovery, integrity, and resource control. The book covers everything from simple to enterprise-class deployments, with emphasis on enterprise-level requirements and coverage of...

Computer Viruses and Other Malicious Software:  A Threat to the Internet Economy
Computer Viruses and Other Malicious Software: A Threat to the Internet Economy
Malware attacks are increasing both in frequency and sophistication, thus posing a serious threat to the Internet economy and to national security. This book is a first step toward addressing the threat of malware in a comprehensive, global manner. It informs readers about malware -- its growth, evolution and countermeasures to combat it; presents...

An Atlas of Gynecologic Oncology
An Atlas of Gynecologic Oncology

While there are a plethora of practical texts relating to general gynecology, there are few specific to gynecological oncology. Taking a "cookbook" approach with clearly written and pictorial instructions, Atlas of Gynecologic Oncology: Investigation and Surgery describes and illustrates important procedures in the repertoire of a...

Digital SLR Photography All-in-One For Dummies
Digital SLR Photography All-in-One For Dummies

The bestselling guide to DSLR photography - now updated for the latest technology and tools!

This new edition gets you up to "shutter speed" on the latest camera technologies, including the new consumer-targeted full-frame models and pro-features that are now incorporated in consumer-focused units. Veteran author...

The Definitive Guide to MySQL, Second Edition
The Definitive Guide to MySQL, Second Edition

Provides a thorough introduction to the installation, configuration, implementation, and administration of MySQL.

The Definitive Guide to MySQL, Second Edition, is the perfect all-in-one guide to MySQL. Whether you’re new to Web application development or you’re already an experienced...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy