Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Instant Kali Linux
Instant Kali Linux

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...

Professional Microsoft SQL Server 2012 Integration Services
Professional Microsoft SQL Server 2012 Integration Services

THE MOST IMPORTANT BUSINESS intelligence tool in the Microsoft Swiss Army knife of tools is SQL Server Integration Services (SSIS). This is because the other tools would be nothing without the cleansing and movement of data into a presentable format. The product can extract, transform, and load (ETL) data astonishingly fast. A 2010 benchmark...

Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
One exciting aspect of software programming is that there are usually many ways to accomplish the same goal. Unfortunately, this also presents software engineers with unique challenges when trying to make the best design or implementation choice for each situation. Experience plays a major role, and the learning...
Git Magic
Git Magic
Git is a version control Swiss army knife. A reliable versatile multipurpose revision control tool whose extraordinary flexibility makes it tricky to learn, let alone master. As Arthur C. Clarke observed, any sufficiently advanced technology is indistinguishable from magic. This is a great way to approach Git: newbies can ignore its inner...
Getting Started with Simulink
Getting Started with Simulink

Get up and running with Simulink with this hands-on, easy-to-read guide

Overview

  • Dig deep into Simulink
  • No unnecessary theory - start modelling right away
  • Complex concepts made easy through examples
  • Packed with illustrations and detailed step-by-step...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes

Preparing for the Worst details the best practices in antiterrorism tactics and preparing for disaster. This book is for typical American families, business travelers, corporate executive management personnel, emergency first responders, school administrators, and local government officials responsible for public safety and emergency...

The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
What do Einstein's theory of relativity, string theory, and lots of other mind-bending—and space-bending—revelations of modern physics have in common? None of them could have been discovered until scientists and mathematicians recognized an uncomfortable truth—that there was a reason the world's greatest mathematical minds had...
Persuasive Technology: Using Computers to Change What We Think and Do (The Morgan Kaufmann Series in Interactive Technologies)
Persuasive Technology: Using Computers to Change What We Think and Do (The Morgan Kaufmann Series in Interactive Technologies)
With compelling insights and illuminating examples, the author reveals how Web sites, software applications, and mobile devices can be used to change people’s attitudes and behavior.

Can computers change what you think and do? Can they motivate you to stop smoking, persuade you to buy insurance, or convince you to join the Army?

...
Nonprofit Essentials: Managing Technology
Nonprofit Essentials: Managing Technology

This book is intended to help nonprofit leaders become not only more effective as
administrators, marketers, researchers, and fundraisers, but also more responsible custodians
of limited funds.When every penny counts, computers can help to make it
possible for small, committed groups to perform the routine tasks that once...

The 30 Day MBA: Learn the Essential Top Business School Concepts, Skills and Language Whilst Keeping Your Job and Your Cash
The 30 Day MBA: Learn the Essential Top Business School Concepts, Skills and Language Whilst Keeping Your Job and Your Cash
I left the family business, in my case the Army, after a few short years. I hadn’t given much thought to a career before I ‘joined up’ and I followed a similar approach when I left. I found a job in sales and within a year or so was in a very junior management position. The company I worked for was in the vanguard of some new...
Result Page: 11 10 9 8 7 6 5 4 3 2 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy