Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Java Programming 10-Minute Solutions
Java Programming 10-Minute Solutions

The problems encountered by a beginning Java programmer are many—and mostly minor.

The problems you encounter as an experienced Java programmer are far fewer—and far more serious.

Java Programming 10-Minute Solutions provides direct solutions to the thorny...

Handbook of Wireless Networks and Mobile Computing
Handbook of Wireless Networks and Mobile Computing

The past five decades have witnessed startling advances in computing and communication technologies that were stimulated by the availability of faster, more reliable, and cheaper electronic components. The design of smaller and more powerful devices enabled their mobility, which is rapidly changing the way we compute and communicate. For...

FPGAs 101: Everything you need to know to get started
FPGAs 101: Everything you need to know to get started

FPGAs (Field-Programmable Gate Arrays) can be found in applications such as smart phones, mp3 players, medical imaging devices, and for aerospace and defense technology. FPGAs consist of logic blocks and programmable interconnects. This allows an engineer to start with a blank slate and program the FPGA for a specific task, for instance,...

Ninja Mind Control
Ninja Mind Control
Now you can unlock the ancient secrets of Ninja mind control and discover for yourself the fantastic powers of the legendary Ninja warriors. By combining simple methods of meditation with aggressive maneuvers, you can become the master of any situation--from the author of Ninja Secrets of Invisibility.

NINJA MIND CONTROL is, without
...
Using Docker: Developing and Deploying Software with Containers
Using Docker: Developing and Deploying Software with Containers

Docker containers offer simpler, faster, and more robust methods for developing, distributing, and running software than previously available. With this hands-on guide, you’ll learn why containers are so important, what you’ll gain by adopting Docker, and how to make it part of your development...

Game Programming Algorithms and Techniques: A Platform-Agnostic Approach (Game Design/Usability)
Game Programming Algorithms and Techniques: A Platform-Agnostic Approach (Game Design/Usability)

Game Programming Algorithms and Techniques is a detailed overview of many of the important algorithms and techniques used in video game programming today. Designed for programmers who are familiar with object-oriented programming and basic data structures, this book focuses on practical concepts that see actual use in the...

SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Data Structures and Algorithms in Java
Data Structures and Algorithms in Java
Fundamental data structures in a consistent object-oriented framework

Now revised to reflect the innovations of Java 5.0, Goodrich and Tamassia’s Fourth Edition of Data Structures and Algorithms in Java continues to offer accessible coverage of fundamental data structures, using a consistent...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Result Page: 35 34 33 32 31 30 29 28 27 26 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy