Home | Amazing | Today | Tags | Publishers | Years | Search 
The Zombie Survival Guide: Complete Protection from the Living Dead
The Zombie Survival Guide: Complete Protection from the Living Dead
The Zombie Survival Guide is your key to survival against the hordes of undead who may be stalking you right now. Fully illustrated and exhaustively comprehensive, this book covers everything you need to know, including how to understand zombie physiology and behavior, the most effective defense tactics and weaponry, ways to...
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld

During his campaign for reelection in 1996, the Internet-savvy President Bill Clinton used the slogan “Building a Bridge to the 21st Century.” It turns out that the bridge is operated and maintained in cyber form, and that malevolent actors can practice their black arts to disrupt or destroy the bridge, its cyber traffic, and all...

Expert Oracle Practices: Oracle Database Administration from the Oak Table
Expert Oracle Practices: Oracle Database Administration from the Oak Table

This book is an anthology of effective database management techniques representing the collective wisdom of the OakTable Network. With an emphasis upon performance—but also branching into security, national language, and other issues—the book helps you deliver the most value for your company’s investment in Oracle Database...

Maritime Security: International Law and Policy Perspectives from Australia and New Zealand
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand

Maritime security is of vital importance to Australia and New Zealand as both countries depend on maritime transport for their economic survival. Since the events of September 11th 2001, significant questions have been raised as to whether Australia and New Zealand are adequately prepared for the consequences of a major disruption to...

501 Challenging Logic & Reasoning Problems, 2nd Edition
501 Challenging Logic & Reasoning Problems, 2nd Edition

This book—which can be used alone, with other logic and reasoning texts of your choice, or in combination with LearningExpress’s Reasoning Skills Success in 20 Minutes a Day—will give you practice dealing with the types of multiple-choice questions that appear on standardized tests assessing logic, reasoning, judgment, and...

Windows Server 2008 How-To
Windows Server 2008 How-To

Real Solutions for Windows Server 2008 Administrators

 

Need fast, reliable, easy-to-implement solutions for Microsoft Windows Server 2008? This book delivers exactly what you’re looking for. You’ll find tested, step-by-step procedures for...

The Gathering Storm (Wheel of Time, Book 12)
The Gathering Storm (Wheel of Time, Book 12)

Tarmon Gai’don, the Last Battle, looms. And mankind is not ready.

The final volume of the Wheel of Time, A Memory of Light, was partially written by Robert Jordan before his untimely passing in 2007. Brandon Sanderson, New York Times bestselling author of the Mistborn books, was
...

Exploiting Online Games: Cheating Massively Distributed Systems
Exploiting Online Games: Cheating Massively Distributed Systems

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues...

Shatnerquake
Shatnerquake

It's Shatner VS Shatners!

William Shatner? William Shatner. WILLIAM SHATNER!!! It's the first ShatnerCon with William Shatner as the guest of honor! But after a failed terrorist attack by Campbellians, a crazy terrorist cult that worships Bruce Campbell, all of the characters ever played by William Shatner are...

The Last Vampire
The Last Vampire

I am a vampire, and that is the truth. But the modern meaning of the word vampire, the stories that have been told about creatures such as I, are not precisely true. I do not turn to ash in the sun, nor do I cringe when I see a crucifix. I wear a tiny gold cross now around my neck, but only because I like it. I cannot command a pack of wolves...

Lean Integration: An Integration Factory Approach to Business Agility
Lean Integration: An Integration Factory Approach to Business Agility

Use Lean Techniques to Integrate Enterprise Systems Faster, with Far Less Cost and Risk

 

By some estimates, 40 percent of IT budgets are devoted to integration. However, most organizations still attack integration on a project-by-project basis,...

JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy