Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

...

Underwater Acoustic Modeling: Principles, techniques and applications
Underwater Acoustic Modeling: Principles, techniques and applications
The subject of underwater acoustic modeling deals with the translation of our physical understanding of sound in the sea into mathematical formulas solvable by computers. This book divides the subject of underwater acoustic modeling into three fundamental aspects: the physical principles used to formulate underwater acoustic models; the...
Hardening Cisco Routers (O'Reilly Networking)
Hardening Cisco Routers (O'Reilly Networking)

Master one single topic, and everything becomes clearer.

The field of network security is a huge subject. To be a network security expert, you must be an expert on routers, switches, hubs, firewalls, intrusion detection systems (IDS), servers, desktops, email, HTTP, instant messages, sniffers, and a thousand other topics. There are...

Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

Invasion of Privacy!  Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers

Pop-up ads, cookies, spyware, spam, junk mail, telemarketing calls. Rapidly evolving technology has made you a target and your personal information a desirable commodity. Your profile is out there and it’s available not just to the highest bidder, but to every bidder. Technology, advertising, the media, and government have converged to...

Lotus(R) Notes(R) Developer's Toolbox: Tips for Rapid and Successful Deployment
Lotus(R) Notes(R) Developer's Toolbox: Tips for Rapid and Successful Deployment

Lotus® Notes® Developer’s Toolbox will help you streamline and improve every phase of Notes development. Leading IBM Lotus Notes developer Mark Elliott systematically identifies solutions for the key challenges Notes developers face,...

Hypochondriasis: Modern Perspectives on an Ancient Malady
Hypochondriasis: Modern Perspectives on an Ancient Malady
Hypochondriasis remains controversial, despite its 2000-year history. Although it is considered a mental disorder, hypochondriasis is often regarded as a defense mechanism, peculiar cognitive/ perceptual style, means of nonverbal communication, response to stress, abnormal illness behavior, personality trait, distinct personality disturbance, and...
Getting the Most Out of Vacuum Tubes
Getting the Most Out of Vacuum Tubes
The purpose of this book is not to add another volume to the many excellent ones available on what makes the vacuum tube work. Rather, it is intended to shed light on the almost completely neglected subject of why these versatile devices sometimes do not work.

Informed scientists and engineers have frequently stated that the life of a
...
Ad Hoc Mobile Wireless Networks: Protocols and Systems
Ad Hoc Mobile Wireless Networks: Protocols and Systems

The authoritative guide to the state of the art in ad hoc wireless networking.

  • Reflects the field's latest breakthroughs

  • Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much...

Facing the Mountain: A True Story of Japanese American Heroes in World War II
Facing the Mountain: A True Story of Japanese American Heroes in World War II
NEW YORK TIMES BESTSELLER
 
“Masterly. An epic story of four Japanese-American families and their sons who volunteered for military service and displayed uncommon heroism… Propulsive and gripping, in part because of Mr. Brown’s ability to make us care deeply
...
Hacking a Terror Network: The Silent Threat of Covert Channels
Hacking a Terror Network: The Silent Threat of Covert Channels
From a counterterrorism perspective, discovering terrorist communication networks
and methods is extremely important.Terrorists have demonstrated the
capability to exchange messages that vary from archaic (using human couriers)
to technologically advanced using “virtual dead-drops.”The popular press is full
of
...
CCNA Exam Cram (Exam 640-802) (3rd Edition)
CCNA Exam Cram (Exam 640-802) (3rd Edition)
“The CCNA exam is difficult and I would not have passed it if I did not have this book with me. The CCNA Exam Cram is an indispensable resource that guided me from the introduction of networking fundamentals to the application of networking theories. Whether you need to learn from scratch or just need a quick reference, this book is an...
unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy