Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
"The book itself is a commendable achievement, and it deals with the security and software reliability theory in an integrated fashion with emphasis on practical applications to software engineering and information technology. It is an excellent and unique book and definitely a seminal contribution and first of its kind."

...

Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
Exploring Microsoft Office Access 2016 Comprehensive (Exploring for Office 2016 Series)
Exploring Microsoft Office Access 2016 Comprehensive (Exploring for Office 2016 Series)

This book offers full, comprehensive coverage of Microsoft Access.

 

Beyond point-and-click

The goal of the Exploring series is to move students beyond the point-and-click, to understanding the why and...

Network Security: A Beginner's Guide, Second Edition
Network Security: A Beginner's Guide, Second Edition
Essential Skills--Made Easy!

Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack...

Nanotechnology Safety
Nanotechnology Safety

Nanotechnology is a new and emerging discipline that is multidisciplinary and interdisciplinary. The usage of nanosystems, nanomaterials, nano-devices, etc. permeates all aspects of society. Cancer targeting and curing nanosystems are being introduced into the biomedical and pharmaceutical industries; so are lightweight energy absorbing or...

Understanding Wind Power Technology: Theory, Deployment and Optimisation
Understanding Wind Power Technology: Theory, Deployment and Optimisation

Wind energy technology has progressed enormously over the last decade. In coming years it will continue to develop in terms of power ratings, performance and installed capacity of large wind turbines worldwide, with exciting developments in offshore installations.

Designed to meet the training needs of wind engineers, this...

Java 2 Web Developer Certification Study Guide with CD-ROM
Java 2 Web Developer Certification Study Guide with CD-ROM
The Sun Certified Web Component Developer exam is expected to gain quickly in popularity because of the strong impact of Java 2 Enterprise Edition in the marketplace. This Study Guide, aimed at experienced Java programmers, covers all enterprise-level topics comprising the objectives for the exam, including servlets, exception handling, session...
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
In todays society the issue of security, understood in the widest context, have become a crucial one. The people of the information age, having instant access to the sources of knowledge and information expect the technology to improve their safety in all respects. That, straightforwardly, leads to the demand for methods, technologies, frameworks...
Nutrition in Kidney Disease (Nutrition and Health)
Nutrition in Kidney Disease (Nutrition and Health)

Nutrition in Kidney Disease, Second Edition addresses  the relationships between nutrition and (1) normal kidney function and disease, (2) the progressiveness of chronic kidney disease (CKD) and strategies to prevent further compromise, and (3) the treatment and management of kidney failure especially during medical crises, such as acute...

Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Windows Server 2008 Hyper-V Unleashed
Windows Server 2008 Hyper-V Unleashed
Hyper-V is Microsoft’s server virtualization technology built-in to Windows Server 2008.  Virtual Machine Manager 2008 is a System Center add-on that helps organizations better manage their virtual guest images, delegate administration and management, and even extract virtual images from existing physical and virtual servers.  This...
Moodle 1.9 for Design and Technology
Moodle 1.9 for Design and Technology

Educators use the Moodle web application to create effective online learning sites. Creating such learning environments that suit Design and Technology subjects requires understanding and implementation of both basic and advanced Moodle features.

This book takes a detailed look at Moodle features with examples of how to fully...

unlimited object storage image
Result Page: 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy