 |
|
|
 Network Attacks and Defenses: A Hands-on Approach
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both... |  |  Beacon Technologies: The Hitchhiker's Guide to the Beacosystem
Learn the key standardsâiBeacon, Eddystone, Bluetooth 4.0, and AltBeaconâand how they work with other proximity technologies. Then build your understanding of the proximity framework and how to identify and deploy the best solutions for your own business, institutional, or consulting needs.
Proximity technologyâin... |  |  Ignore Everybody: and 39 Other Keys to Creativity
When Hugh MacLeod was a struggling young copywriter living in a YMCA, he started to doodle on the backs of business cards while sitting at a bar. Those cartoons eventually led to a popular blog-gapingvoid.com-and a reputation for pithy insight and humor, in both words and pictures. MacLeod has opinions on everything from marketing to the... |
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |