Home | Amazing | Today | Tags | Publishers | Years | Search 
Thesis Projects: A Guide for Students in Computer Science and Information Systems
Thesis Projects: A Guide for Students in Computer Science and Information Systems
"The authors have written a short book for students doing final year projects in computer science and information systems. Because the authors are from Sweden, the details of the procedures and expectations will vary in other countries. However, in the hands of a discerning reader, this book could be useful at several levels, at many colleges...
CCENT Exam Cram (exam 640-822)
CCENT Exam Cram (exam 640-822)
This book includes a CD-ROM that features:
  • Complete coverage of CCENT exam objectives
  • Realistic exam questions for effective practice
  • Detailed explanations of correct and incorrect answers
  • Multiple exam modes
  • Flash Card format
  • An electronic copy of the book
  • ...
Web Application Vulnerabilities: Detect, Exploit, Prevent
Web Application Vulnerabilities: Detect, Exploit, Prevent
This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,...
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for...
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Path-Oriented Program Analysis
Path-Oriented Program Analysis
This book presents a unique method for decomposing a computer program along its execution paths, for simplifying the subprograms so produced, and for recomposing a program from its subprograms. This method enables us to divide and conquer the complexity involved in understanding the computation performed by a program by decomposing it into a set...
Handbook of Ceramic Composites
Handbook of Ceramic Composites

Ceramic matrix composites (CMCs) are at the forefront of advanced materials technology because of their light weight, high strength and toughness, high temperature capabilities, and graceful failure under loading. During the last 25 years, tremendous progress has been made in the development and advancement of CMCs under various research...

RFID Handbook: Applications, Technology, Security, and Privacy
RFID Handbook: Applications, Technology, Security, and Privacy
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
Microsoft Forefront Security Administration Guide
Microsoft Forefront Security Administration Guide
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other...
Hypochondriasis: Modern Perspectives on an Ancient Malady
Hypochondriasis: Modern Perspectives on an Ancient Malady
Hypochondriasis remains controversial, despite its 2000-year history. Although it is considered a mental disorder, hypochondriasis is often regarded as a defense mechanism, peculiar cognitive/ perceptual style, means of nonverbal communication, response to stress, abnormal illness behavior, personality trait, distinct personality disturbance, and...
CCNA Exam Cram (Exam 640-802) (3rd Edition)
CCNA Exam Cram (Exam 640-802) (3rd Edition)
“The CCNA exam is difficult and I would not have passed it if I did not have this book with me. The CCNA Exam Cram is an indispensable resource that guided me from the introduction of networking fundamentals to the application of networking theories. Whether you need to learn from scratch or just need a quick reference, this book is an...
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy