Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
The hacker subculture — shrouded in mystery, spiced with a hint of glamour, and thoroughly misunderstood by those who don't belong — was revealed in the original edition of The Best of 2600: A Hacker Odyssey. The book became an instant bestseller. If you're a 2600 subscriber, a member of the hacker community, a geek freak, or simply a...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Lactoferrin:  Natural - Multifunctional - Antimicrobial
Lactoferrin: Natural - Multifunctional - Antimicrobial

Illnesses resulting from foodborne pathogens occur at least 6 million times each year and cause an estimated 9,000 deaths. For decades, food microbiologists have developed various effective methods of food protection. However, the constant development of multi-facet food processing technologies and the emergence of potent foodborne pathogens,...

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.

You'll learn how to configure your network from the ground up, starting by setting up your...

Open Government: Collaboration, Transparency, and Participation in Practice
Open Government: Collaboration, Transparency, and Participation in Practice

In a world where web services can make real-time data accessible to anyone, how can the government leverage this openness to improve its operations and increase citizen participation and awareness? Through a collection of essays and case studies, leading visionaries and practitioners both inside and outside of government share their...

Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit
Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit

We are the technologically inclined and normality spurned, or at least, this is how we perceive (or perhaps want) things to be. We are adept at dealing with machines, and manipulating things. Everything comes easy to us, and when things always come to you without any failure, you begin to feel nothing matters… that the...

Mastering Microsoft Exchange Server 2007 SP1
Mastering Microsoft Exchange Server 2007 SP1
Microsoft Exchange Server provides a reliable messaging system that protects against spam and viruses and allows for access to e-mail, voicemail, and calendars from a variety devices and any location. Fully updated for the latest release of Microsoft Exchange Server 2007 Service Pack 1 (SP1), this book offers a look at the significant improvements...
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran

As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China now holding so much of America’s debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iran’s efforts to develop into a nuclear power...

Nutrition and AIDS, Second Edition (Modern Nutrition)
Nutrition and AIDS, Second Edition (Modern Nutrition)

Evidence shows that nutritional supports can help maintain health in the HIV-infected patient by replacing lost nutrients, compensating for nutritional damage done by the retrovirus-induced immunodeficiency, and stimulating the remaining immune system and cells for better host defenses.

This new edition of Nutrition and AIDS
...

Learning Geospatial Analysis with Python
Learning Geospatial Analysis with Python

If you know Python and would like to use it for Geospatial Analysis this book is exactly what you've been looking for. With an organized, user-friendly approach it covers all the bases to give you the necessary skills and know-how.

Overview

  • Construct applications for GIS development by exploiting...
The Flaw of Averages: Why We Underestimate Risk in the Face of Uncertainty
The Flaw of Averages: Why We Underestimate Risk in the Face of Uncertainty
A must-read for anyone who makes business decisions that have a major financial impact.

As the recent collapse on Wall Street shows, we are often ill-equipped to deal with uncertainty and risk. Yet every day we base our personal and business plans on uncertainties, whether they be next month’s sales, next year’s...

RFID Essentials (Theory in Practice)
RFID Essentials (Theory in Practice)

Radio Frequency Identification (RFID) is rapidly changing the
way businesses track inventory and assets. From Wal-Mart and Tesco to the
U.S. Department of Defense, early efforts are already showing benefits,
but software, integration, and data processing for RFID still present a
challenge. If you are a
...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy