Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage...

Founders at Work: Stories of Startups' Early Days (Recipes: a Problem-Solution Ap)
Founders at Work: Stories of Startups' Early Days (Recipes: a Problem-Solution Ap)
Sprinters apparently reach their highest speed right out of the blocks, and spend the rest of the race slowing down. The winners slow down the least. It’s that way with most startups too. The earliest phase is usually the most productive. That’s when they have the really big ideas. Imagine what Apple was like when 100 percent of its...
Innovation Passport: The IBM First-of-a-Kind (FOAK) Journey From Research to Reality
Innovation Passport: The IBM First-of-a-Kind (FOAK) Journey From Research to Reality

“Finally! A book that lays out a thorough yet workable path to collaborative innovation! With a highly readable style and using great examples, Frederich and Andrews describe the process by which IBM makes collaborative innovation work from a process, company, and customer standpoint. By following the guidelines...

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Instructional Engineering in Networked Environments (Tech Training Series)
Instructional Engineering in Networked Environments (Tech Training Series)
A Dynamic, Research-Based Approach to Knowledge Management

In this book, Gilbert Paquette–an internationally recognized expert in the field of technology-based training–offers IT professionals, trainers, and consultants a revolutionary method for going beyond simple information management. Instructional Engineering in Networked...

OCA Oracle Database 11g: SQL Fundamentals I: A Real World Certification Guide (1ZO-051)
OCA Oracle Database 11g: SQL Fundamentals I: A Real World Certification Guide (1ZO-051)

The Oracle Database 11g: SQL Fundamentals I exam is the first stepping stone in getting the Oracle Certified Associate Certification for Oracle Database 11g. The SQL programming language is used in every major relational database today and understanding the real world application of it is the key to becoming a successful DBA.

This...

MCAD/MCSE/MCDBA Self-Paced Training Kit: Microsoft SQL Server 2000 Database Design and Implementation, Second Edition (Exam 70-229)
MCAD/MCSE/MCDBA Self-Paced Training Kit: Microsoft SQL Server 2000 Database Design and Implementation, Second Edition (Exam 70-229)

Learn how to deliver powerful database solutions using SQL Server 2000 Enterprise Edition—and prepare for the Microsoft Certified Professional (MCP) exam—with this official Microsoft study guide. Work at your own pace through the lessons and hands-on exercises. And use the special exam-prep section and testing tool to measure what...

Hillbilly: A Cultural History of an American Icon
Hillbilly: A Cultural History of an American Icon
    Harkins, assistant professor of history at Western Kentucky University, means to examine the "cultural and ideological construct `the hillbilly'... rather than the actual people of the southern mountains." To this end, he examines some obscure early American printed material, Paul Webb's Esquire magazine cartoons from...
Data Mining Methods and Models
Data Mining Methods and Models
Apply powerful Data Mining Methods and Models to Leverage your Data for Actionable Results

Data Mining Methods and Models provides:

  • The latest techniques for uncovering hidden nuggets of information
  • The insight into how the data mining algorithms actually work
  • The hands-on experience of...
Create Your Own DVDs
Create Your Own DVDs
I set out to write this book for one simple reason: I want you to have fun making your own movies with your camcorder and your PC. I want to help you get up to speed so that you can easily create movies that your friends and family will actually watch.

Although the title of this book might suggest that it is strictly for people who want
...
Building Web Reputation Systems
Building Web Reputation Systems

Today’s Web is the product of over a billion hands and minds. Around the clock and around the globe, people are pumping out contributions small and large: full-length features on Vimeo, video shorts on YouTube, comments on Blogger, discussions on Yahoo! Groups, and tagged-and-titled Del.icio.us bookmarks. User-generated content...

Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

unlimited object storage image
Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy