Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Biz-War and the Out-of-Power Elite: The Progressive-Left Attack on the Corporation
Biz-War and the Out-of-Power Elite: The Progressive-Left Attack on the Corporation
It is the argument of this book that the contemporary Progressive movement in the United States, designed to replace the Liberalism whose demise was the object and accomplishment of the Reagan Revolution, is the product of a series of strategic experiments and decisions by activists in organized labor, in the environmental and human rights...
Linux Security Cookbook
Linux Security Cookbook
f you run a Linux machine, you must think about security. Consider this story told by Scott, a system administrator we know:

In early 2001, I was asked to build two Linux servers for a client. They just wanted the machines installed and put online. I asked my boss if I should secure them, and he said no, the...

How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Rails Recipes
Rails Recipes
Rails is large, powerful, and new. How do you use it effectively? How do you harness the power? And, most important, how do you get high quality, real-world applications written?

From the latest Ajax effects to time-saving automation tips for your development process, Rails Recipes will show you how the...

Self-Defending Networks: The Next Generation of Network Security
Self-Defending Networks: The Next Generation of Network Security

Protect your network with self-regulating network security solutions that combat both internal and external threats.

  • Provides an overview of the security components used to design proactive network security

  • Helps network security...

Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats
Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats

Terrorist or criminal attack, fire emergency, civil or geographic disruption, or major electrical failure—recent years have witnessed an increase in the number of natural disasters and man-made events that have threatened the livelihoods of businesses and organizations worldwide. Security Manager’s Guide to Disasters:...

Lean Integration: An Integration Factory Approach to Business Agility
Lean Integration: An Integration Factory Approach to Business Agility

Use Lean Techniques to Integrate Enterprise Systems Faster, with Far Less Cost and Risk

 

By some estimates, 40 percent of IT budgets are devoted to integration. However, most organizations still attack integration on a project-by-project basis,...

Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
"He has written an excellent book that belongs in your personal library." Cryptologia

"Churchhouse (emer., Cardiff Univ., Wales) offers a history and explanation of codes, ciphers, cryptography, and cryptanalysis from Julius Caesar and WWII code-breaking activities to the present day including the world of the Internet.
...
Blueprints Visual Scripting for Unreal Engine
Blueprints Visual Scripting for Unreal Engine

Build professional 3D games with Unreal Engine 4's Visual Scripting system

About This Book

  • Take your game designs from inspiration to a fully playable game that you can share with the world, without writing a single line of code.
  • Learn to use visual scripting to develop gameplay...
Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and
...

unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy