Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from...
Computer Networks (5th Edition)
Computer Networks (5th Edition)

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in...

Google Analytics
Google Analytics

Do you know what people do when they visit your website or web app? Or how much the site contributes to your bottom line? Google Analytics keeps track and makes it easy for you to learn precisely what's happening. This hands-on guide shows you how to get the most out of this free and powerful tool -- whether you're new to...

Natural Language Processing with Python
Natural Language Processing with Python
This book offers a highly accessible introduction to Natural Language Processing, the field that underpins a variety of language technologies, ranging from predictive text and email filtering to automatic summarization and translation. With Natural Language Processing with Python, you'll learn how to write Python programs to work with large...
Nagios Core Administration Cookbook
Nagios Core Administration Cookbook

Develop an integrated monitoring solution for virtually any kind of network

Overview

  • Monitor almost anything in a network.
  • Control notifications in your network by configuring Nagios Core.
  • Get a handle on best practices and time-saving configuration methods for a leaner...
The Mathematics of Coding Theory
The Mathematics of Coding Theory

This book is intended to be accessible to undergraduate students with two years of typical mathematics experience, most likely meaning calculus with a little linear algebra and differential equations. Thus, specifically, there is no assumption oLa background inabstr&;t algebra or number theory, nor of probability, nor of linear...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your focus to...
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
FileMaker Pro 10: The Missing Manual
FileMaker Pro 10: The Missing Manual
The FileMaker Pro 10 desktop database lets you do almost anything with the information you give it -- especially with this book as your guide. Clear, thorough, and accessible, FileMaker Pro 10: The Missing Manual helps you get in, build your database, and get the results you need, whether you're running a business, pursuing a hobby, or...
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
"Although the book is directed toward technology courses...it makes for interesting, thought-provoking reading." - Monitoring Times

As new communications applications are developed and brought to market, it is vital for communications professionals to keep abreast of these issues. Since the
...
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X

OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.

If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,...

unlimited object storage image
Result Page: 52 51 50 49 48 47 46 45 44 43 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy