Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Content is Currency: Developing Powerful Content for Web and Mobile
Content is Currency: Developing Powerful Content for Web and Mobile

Content. It’s become a very powerful word in the Internet age, empowering people everywhere to have a voice. Through words, video, audio, and all its other forms, content tells the story of your product or service and propels your brand into the hearts and minds of your prospects, customers, and others. Without content, the web would...

Introduction to Hardware Security and Trust
Introduction to Hardware Security and Trust
As technology feature size of devices and interconnects shrink at the rate predicted by Moore’s law, gate density and design complexity on single integrated chip (IC) keep increasing in recent decades. The close to nanoscale fabrication process introduces more manufacturing errors. New failure mechanisms that are not covered...
Introducing Microsoft SQL Server 2012
Introducing Microsoft SQL Server 2012
Microsoft SQL Server 2012 is Microsoft’s first cloud-ready information platform. It gives organizations effective tools to protect, unlock, and scale the power of their data, and it works across a variety of devices and data sources, from desktops, phones, and tablets, to datacenters and both private and public clouds. Our purpose in...
Renewable and Efficient Electric Power Systems
Renewable and Efficient Electric Power Systems
Engineering for sustainability is an emerging theme for the twenty-first century, and the need for more environmentally benign electric power systems is a critical part of this new thrust. Renewable energy systems that take advantage of energy sources that won’t diminish over time and are independent of fluctuations in...
Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Within the last 15 years in the field of “sputtering by particle bombardment” several new and important results have been published in internal reports, in PhD thesis, as well as in the open literature. This relates especially to a more detailed understanding of the sputtering process by computational means such as...
CompTIA Security+ SY0-301 Authorized Exam Cram (3rd Edition)
CompTIA Security+ SY0-301 Authorized Exam Cram (3rd Edition)

CD FEATURES More Than 200 PRACTICE QUESTIONS

 

CompTIA® Security+ Exam Cram, Third Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for...

Information Technology for Management: Improving Strategic and Operational Performance
Information Technology for Management: Improving Strategic and Operational Performance
Students graduating today face a tough job market—making it important that they develop the expertise and critical thinking skills that give them a competitive edge. Information Technology for Management, 8th edition is designed to give students an edge when they face the challenges and opportunities that business...
Architecting Mobile Solutions for the Enterprise
Architecting Mobile Solutions for the Enterprise
As far back as 1999, some smart guys predicted that mobile would become the primary focus of development in only a few years. Although it has taken a bit more time than expected, the era of mobile software has arrived at last. Why did it take so long? The answer is surprisingly simple: mobile software needed a critical mass of users...
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
One exciting aspect of software programming is that there are usually many ways to accomplish the same goal. Unfortunately, this also presents software engineers with unique challenges when trying to make the best design or implementation choice for each situation. Experience plays a major role, and the learning...
CRM Fundamentals
CRM Fundamentals

Many of you reading this book are about to embark on the journey of implementing customer relationship management (CRM) software within your organization; some of you are completely new to CRM, while others have been through a CRM implementation with varied success. This book was written to provide business leaders and stakeholders with a...

Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Windows Internals, Sixth Edition is intended for advanced computer professionals (both developers and system administrators) who want to understand how the core components of the Microsoft Windows 7 and Windows Server 2008 R2 operating systems work internally. With this knowledge, developers can better...
Result Page: 217 216 215 214 213 212 211 210 209 208 207 206 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy