Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Since the publication of Malware Forensics: Investigating and Analyzing Malicious Code in 2008, the number and complexity of programs developed for malicious and illegal purposes has grown substantially. The 2011 Symantec Internet Security Threat Report announced that over 286 million new threats emerged in the past year....
Solving Tough Problems: An Open Way of Talking, Listening, and Creating New Realities
Solving Tough Problems: An Open Way of Talking, Listening, and Creating New Realities
ur most common way of solving problems-at home, at work, in our communities, in national and international affairs-is to use our expertise and authority to apply piece-by-piece, tried-and-true "best practices." This works for simple, familiar, uncontentious problems. But it doesn't work for the complex, unfamiliar, conflictual problems...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
CWNA: Certified Wireless Network Administrator Study Guide (Exam PW0-100)
CWNA: Certified Wireless Network Administrator Study Guide (Exam PW0-100)
One of the fastest-growing certifications on the market, CWNA is rapidly becoming the premier professional wireless certification for network administrators. It is also the foundation-level exam for the complete Certified Wireless Network Professional program. Now you can join the move to Wi-Fi and prepare for your certification with this...
Golf For Dummies
Golf For Dummies
If you don't know the difference between a lob wedge and a lemon wedge, check out Golf for Dummies, by CBS commentator Gary McCord, one of the game's most colorful--and knowledgeable--characters. It's a wonderful, often hilarious, never boring introduction to the game. Don't let the foreword by Kevin Costner or the afterword by Hootie...
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)

The OpenSSH suite of tools provides replacements for some of the common administrative tools used today such as telnet, FTP and the r-utilities; yet, these tools, considered insecure because they use clear-text communication over the network, are in still in common use. OpenSSH provides an encrypted channel between computers and remote servers...

How to Succeed in the Enterprise Software Market
How to Succeed in the Enterprise Software Market
"A must read for those who deliver software solutions, as well as their customers." -- David P. Norton, co-author of The Balanced Scorecard

"Le Clair provides that 'interdependent view' required for success. An excellent set of tools for the consultant or business analyst." -- James Watson, CEO, Doculabs,
...
Programming C# 3.0
Programming C# 3.0
Written by popular author and .NET expert Jesse Liberty, this thoroughly updated tutorial for beginning to intermediate programmers covers the latest release of Microsoft's popular C# language (C# 3.0) and the newest .NET platform for developing Windows and web applications. Our bestselling Programming C# 3.0, now in its fifth edition, is a...
Computers: Systems, Terms and Acronyms, 14th Edition
Computers: Systems, Terms and Acronyms, 14th Edition

Computers: Systems, Terms and Acronyms is THE technical reference for non-technical people who need to understand Information Technology. The book contains narrative coverage of IT concepts and systems written in plain English for non-technical people. It also contains more than 3,700 definitions of generic technical terms and acronyms,...

Extending and Embedding PHP
Extending and Embedding PHP
In just a few years PHP has rapidly evolved from a small niche language to a powerful web development tool. Now in use on over 14 million Web sites, PHP is more stable and extensible than ever. However, there is no documentation on how to extend PHP; developers seeking to build PHP extensions and increase the performance and functionality of their...
Guardians of the Revolution: Iran and the World in the Age of the Ayatollahs
Guardians of the Revolution: Iran and the World in the Age of the Ayatollahs
The late imam was the greatest political and military analyst and a great politician. Imam Khomeini was the best possible pattern for all people in all ages and eras,” declared President Mahmoud Ahmadinejad in 2008.1 It is rare for a revolutionary leader to exercise such infl uence over the imagination of his successors two decades after his...
Operational Risk with Excel and VBA: Applied Statistical Methods for Risk Management (Wiley Finance)
Operational Risk with Excel and VBA: Applied Statistical Methods for Risk Management (Wiley Finance)

Praise For Operational Risk with Excel and VBA

"Dr. Nigel Da Costa Lewis has produced the most exciting volume ever on operational risk modeling. It is a must for students, practitioners, risk managers, and senior executives. . . I feel this work is the first step in revolutionizing the discipline. Other books in this field tell...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy