Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RFID For Dummies
RFID For Dummies
Somewhere, separated from you by just a few degrees, is not Kevin Bacon,
but an 800-pound gorilla demanding that you adopt radio frequency identification,
or RFID — a technology you may have never even heard of until
just a few months ago. Chances are that gorilla wears a stylish blue smock
with a yellow smiley face on it
...
The Magic Eightball Test: A Christian Defense of Halloween and All Things Spooky
The Magic Eightball Test: A Christian Defense of Halloween and All Things Spooky

What happens when a pumpkin carving, trick or treating, late night monster movie watching monster fan becomes a Christian? Is Halloween now off-limits? Is the whole thing pagan, occult, satanic? Is a love for spooky things and Gothic detail just plain sick? Lint Hatcher, past editor of Wonder magazine and all-purpose pop culture maven,...

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

Digital Photography Bible (Desktop Edition)
Digital Photography Bible (Desktop Edition)
If a digital camera can do it, you can do it, too...

Good photography is more art than science. You need to know not only the hardware and software, but also how to compose a photo, edit and improve the images you get, and take pictures that achieve your objectives. From choosing a digital camera to taking shots that tell a...

PRINCE2 Study Guide: 2017 Update
PRINCE2 Study Guide: 2017 Update

Everything you need to pass the PRINCE2 with flying colors

The PRINCE2 Study Guide, Second Edition, offers comprehensive preparation for the latest PRINCE2 exam. Covering 100 percent of the exam objectives, this guide provides invaluable guidance that will help you master both the material and its applications;...

Handbook of Ceramic Composites
Handbook of Ceramic Composites

Ceramic matrix composites (CMCs) are at the forefront of advanced materials technology because of their light weight, high strength and toughness, high temperature capabilities, and graceful failure under loading. During the last 25 years, tremendous progress has been made in the development and advancement of CMCs under various research...

Secure Messaging with Microsoft  Exchange Server 2003
Secure Messaging with Microsoft Exchange Server 2003

Get expert guidance to assess and help improve the security of your Exchange Server 2003 messaging systems. From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange...

Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
" … The Best of 2600: A Hacker Odyssey is an important, amazing book that tells the story of these kids and adults as they explore a new frontier."
—John Baichtal (Wired Blog, August, 2008)

"...a testament to a culture which thrived before computers and the internet mattered to most of...

System Analysis, Design, and Development : Concepts, Principles, and Practices
System Analysis, Design, and Development : Concepts, Principles, and Practices
Learn to develop systems that meet customer needs and organizational objectives

Successful system development requires formulation and implementation of a sound technical strategy that accurately translates the user's operational needs into a physical solution to comply with their specifications and contract requirements. System Analysis,...

Strategic Computing: DARPA and the Quest for Machine Intelligence, 1983-1993 (History of Computing)
Strategic Computing: DARPA and the Quest for Machine Intelligence, 1983-1993 (History of Computing)
This is the story of an extraordinary effort by the U.S. Department of Defense to hasten the advent of "machines that think." From 1983 to 1993, the Defense Advanced Research Projects Agency (DARPA) spent an extra $1 billion on computer research aimed at achieving artificial intelligence. The Strategic Computing Initiative (SCI) was...
Java Programming 10-Minute Solutions
Java Programming 10-Minute Solutions

The problems encountered by a beginning Java programmer are many—and mostly minor.

The problems you encounter as an experienced Java programmer are far fewer—and far more serious.

Java Programming 10-Minute Solutions provides direct solutions to the thorny...

Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy