Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Extended STL, Volume 1: Collections and Iterators
Extended STL, Volume 1: Collections and Iterators
My Uncle John is what my parents’ generation would call “a man’s man.” He’s tough, rugged, a bit scary, with more than a little of the cowboy in him, and he would admit to fear about as readily as I could render modest defeat. So when he described to me that the challenge in doing your second parachute jump is...
Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools
Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools

A Toolkit for IT Professionals

Whether you work for a publicly traded or pre-IPO company or as an IT consultant, you are familiar with the daunting task of complying with the Sarbanes-Oxley Act. You have no doubt seen the hour and dollar estimates for compliance go up...

C# and the .NET Platform, Second Edition
C# and the .NET Platform, Second Edition
C# and the .NET Platform, Second Edition starts with a brief overview of the C# language and then quickly moves
to key technical and architectural issues for .NET developers. Not only is there extensive coverage of the .NET
Framework, but Andrew Troelsen also shows programmers what they need to know about such necessary, but
subtle,
...
Data Mining Methods and Models
Data Mining Methods and Models
Apply powerful Data Mining Methods and Models to Leverage your Data for Actionable Results

Data Mining Methods and Models provides:

  • The latest techniques for uncovering hidden nuggets of information
  • The insight into how the data mining algorithms actually work
  • The hands-on experience of...
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Engineering Science, Fifth Edition
Engineering Science, Fifth Edition
The most comprehensive engineering science text available - fully in line with the latest pre-degree course requirements

. Generic topic-based approach - ensures suitability for all vocational and pre-degree level students
. Coverage of all the mechanical, electrical and electronic principles
...
TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series in Networking)
TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series in Networking)
With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing...
Wheels and Axles (Early Bird Physics Series)
Wheels and Axles (Early Bird Physics Series)
You work every day. At home, one of your chores may be painting. At school, you work when you sharpen your pencil. You work at snack time. And you work when you race in gym. Eating and playing are work, too!

About the Authors

Sally M. Walker is the author of many books for young readers. When she isn’t busy writing and
...
CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)
CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)

CD Features More Than 200 Practice Questions

 

CompTIA® Network+ N10-005 Authorized Exam Cram, Fourth Edition is the perfect study guide to help you pass CompTIA’s new Network+ N10-005 exam. It provides coverage and practice questions for...

Special Edition Using Microsoft Windows XP Home (3rd Edition)
Special Edition Using Microsoft Windows XP Home (3rd Edition)

The only Windows XP Home book readers need! Windows 95/98/Me users rejoice! Finally, the stability of Windows NT/2000 in an operating system built for the home and small business user - Windows XP has answered many prayers. Don't be fooled, however. If you think there was a lot to learn when the world jumped from DOS to Windows 95, then you're...

unlimited object storage image
Result Page: 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy