Home | Amazing | Today | Tags | Publishers | Years | Search 
Sams Teach Yourself Microsoft Access 2002 Programming in 24 Hours
Sams Teach Yourself Microsoft Access 2002 Programming in 24 Hours
Sams Teach Yourself Access 2002 Programming in 24 Hours will considerably improve the quality of the database applications that the reader can create with Microsoft Access. Concise tutorials that quickly bring the reader up to speed will be the goal of each chapter. Having completed this book, the readers will be able to understand any sample VBA...
Nessus Network Auditing, Second Edition
Nessus Network Auditing, Second Edition
In the war zone that is the modern Internet, manually reviewing each networked system for security fl aws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack.
...
Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Transactions on Data Hiding and Multimedia Security II (Lecture Notes in Computer Science)
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to...
Chess For Dummies
Chess For Dummies
It was inevitable, thank goodness, that the Dummies series would give us an introductory chess book. The light touch is perfect to offset the sober aura of mystery that surrounds the game in many people's minds. And the extras that reach beyond the well-written move explanations, strategies, and pattern-recognition make the book a real...
Quantifying and Controlling Catastrophic Risks
Quantifying and Controlling Catastrophic Risks
The perception, assessment and management of risk are increasingly important core principles for determining the development of both policy and strategic responses to civil and environmental catastrophes. Whereas these principles were once confined to some areas of activity i.e. financial and insurance, they are now widely used in civil and...
Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002
Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002, held in Redwood Shores, California, USA in August 2002.

The 41 revised full papers presented together with two invited contributions were carefully selected from 101 submissions during two...

Controlling Cholesterol For Dummies (Health & Fitness)
Controlling Cholesterol For Dummies (Health & Fitness)

"the authors...know their stuff...the book is a fairly painless way to learn more about subjects you might rather avoid." -- Chicago Tribune, December 1, 2002

Need to get your cholesterol in check? You’ll find the latest information about cholesterol, including treatments, drug information, and
...

Encyclopedia of Disasters: Environmental Catastrophes and Human Tragedies
Encyclopedia of Disasters: Environmental Catastrophes and Human Tragedies
This encyclopedia is a descriptive, illustrated account of disasters, both natural and human-induced, that have occurred throughout the world at different times over the past two thousand years. They include experiences of earthquakes, tsunamis, volcanic eruptions, floods, extremes of weather, droughts, pandemic illnesses, land subsidence and...
American Medical Association Complete Guide to Men's Health
American Medical Association Complete Guide to Men's Health
Here from the American Medical Association—the most trusted name in health—is the first comprehensive, up-to-date guidebook to help men and their loved ones understand the male body and learn how men can achieve their optimal level of health and fitness.

Giving you the most current medical knowledge on prevention as well as...

The Calculus Gallery: Masterpieces from Newton to Lebesgue
The Calculus Gallery: Masterpieces from Newton to Lebesgue
More than three centuries after its creation, calculus remains a dazzling intellectual achievement and the gateway into higher mathematics. This book charts its growth and development by sampling from the work of some of its foremost practitioners, beginning with Isaac Newton and Gottfried Wilhelm Leibniz in the late seventeenth century and...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy