Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Black's Medical Dictionary (Writing Handbook)
Black's Medical Dictionary (Writing Handbook)

The forty-first edition gives over 5000 definitions and descriptions of medical terms and concepts accompanied by appendices on important subjects such as Health Economics, Complementary and Alternative Medicine, Common Medical Tests and an address list of support and professional organisations. All material has been checked and updated with...

The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

InfoSec Career Hacking : Sell Your Skillz, Not Your Soul
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses...

Aquatic Invasions in the Black, Caspian, and Mediterranean Seas
Aquatic Invasions in the Black, Caspian, and Mediterranean Seas
The present volume contains the presentations of a NATO advanced Research Workshop
(ARW) entitled “The invasion of the Black, Mediterranean and Caspian Seas by the
American Ctenophore, Mnemiopsis leidyi Agassiz: a multidisciplinary perspective
and a comparison with other aquatic invasions”, held on 24 - 26 June 2002 in
...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Purely Functional Data Structures
Purely Functional Data Structures

Most books on data structures assume an imperative language such as C or C++. However, data structures for these languages do not always translate well to functional languages such as Standard ML, Haskell, or Scheme. This book describes data structures from the point of view of functional languages, with examples, and presents design...

France: A Short History
France: A Short History

A short and entertaining narrative of France from prehistory to the present, recounting the great events and personalities that helped create France’s cultural and political influence today.

Country and destination, nation and idea, France has a rich and complex history that fascinates the world...

Digital Photography: 99 Easy Tips To Make You Look Like A Pro!
Digital Photography: 99 Easy Tips To Make You Look Like A Pro!

Get tips and advice for taking better pictures with your digital camera from expert photographer Ken Milburn. Discover all the cool things you can do--like making panoramas, short movies, rapid shot sequences for Web animations, instant greeting cards (both in print and for the Web), restoring and retouching photos--and much more.
...

An Introduction to Tensor Calculus, Relativity and Cosmology
An Introduction to Tensor Calculus, Relativity and Cosmology
This elementary introduction pays special attention to aspects of tensor calculus and relativity that students tend to find most difficult. Its use of relatively unsophisticated mathematics in the early chapters allows readers to develop their confidence within the framework of Cartesian coordinates before undertaking the theory of tensors in...
Cisco Network Security Little Black Book
Cisco Network Security Little Black Book
With this concise, problem-solving guide, networking professionals will learn how to identify network security threat implement uniform security throughout their networks, secure remote dial-in access with CiscoSecure ACS and Cisco IOS AAA features, protect Internet access on their perimeter routers with the CiscoSecure IOS firewall software, and...
How to Do Everything With Your iPAQ(R) Pocket PC
How to Do Everything With Your iPAQ(R) Pocket PC
Now you can do more with your iPAQ than you ever thought possible with this easy-to-use guide. Learn to maximize your iPAQ's built-in features and increase functionality with additional applications and accessories. You'll also get step-by-step guidance for using Word, Excel, and Outlook and managing your finances with the Pocket Money application....
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy