Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Cognitive-Behavioral Therapies, Fourth Edition
Handbook of Cognitive-Behavioral Therapies, Fourth Edition
Now revised and expanded with over 50% new material, this definitive clinical reference is the text of choice for graduate-level courses in evidence-based psychotherapy. Foremost authorities describe the conceptual and scientific foundations of cognitive-behavioral therapy (CBT) and provide a framework for assessment and case...
Internet Gaming Disorder: Theory, Assessment, Treatment, and Prevention
Internet Gaming Disorder: Theory, Assessment, Treatment, and Prevention
Internet Gaming Disorder: Theory, Assessment, Treatment, and Prevention is an informative and practical introduction to the topics of Internet gaming disorder and problematic gaming. This book provides mental health clinicians with hands-on assessment, prevention, and treatment techniques for clients with problematic gaming behaviors...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python
Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python

Gain experience of building a next-generation collaboration robot

Key Features

  • Get up and running with the fundamentals of robotic programming
  • Program a robot using Python and the Raspberry Pi 3
  • Learn to build a smart robot with interactive and AI-enabled...
The Art of Error Correcting Coding
The Art of Error Correcting Coding
Building on the success of the first edition, which offered a practical introductory approach to the techniques of error concealment, this book, now fully revised and updated, provides a comprehensive treatment of the subject and includes a wealth of additional features. The Art of Error Correcting Coding, Second Edition explores...
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...

How to Write Essays & Assignments (Smarter Study Guides)
How to Write Essays & Assignments (Smarter Study Guides)
Welcome to How to Write Essays and Assignments. We’re pleased that you’ve chosen this book and we hope it will help you with all your academic writing tasks. Our aim has been to provide practical tips to guide you from planning to submission, with help along the way on topics like punctuation, spelling and grammar, so...
Execution IS the Strategy: How Leaders Achieve Maximum Results in Minimum Time
Execution IS the Strategy: How Leaders Achieve Maximum Results in Minimum Time
Turn Strategy into Performance!

In today’s world of rapid, disruptive change, strategy can’t be separate from execution—it has to emerge from execution. You have to continually adjust your strategy to fit new realities. But if your organization isn’t set up to be fast on its feet, you could
...
CCIE Self-Study: CCIE Security Exam Certification Guide, Second Edition
CCIE Self-Study: CCIE Security Exam Certification Guide, Second Edition
The Cisco authorized self-study test preparation guide for CCIE Security 2.0 350-018 written exam The only official, Cisco endorsed study guide for the CCIE Security 2.0 written exam Includes best-of-breed self-assessment series features, including a CD-ROM test engine, "Do I Know This Already?" quizzes, topic lists/foundation...
Result Page: 79 78 77 76 75 74 73 72 71 70 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy