Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice...
Essential to database design, entity-relationship (ER) diagrams are known for their usefulness in mapping out clear database designs. They are also well-known for being difficult to master. With Database Design Using Entity-Relationship Diagrams, Second Edition, database designers, developers, and students preparing...
This book will help the electronics experimenter understand and use the low-cost digital integrated circuits now available for practical, everyday electronics projects. The material presented attempts to shatter the myth that digital IC's are too expensive, too complex, or too awesome to...
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The...
Up to this point in your career you have been asked to use mathematics to solve
rather elementary problems in the physical sciences. However, when you graduate
and become a working scientist or engineer you will often be confronted with
complex real-world problems. Understanding the material in this book is a first
step toward...
Unity in Action teaches you how to write and deploy games. You'll master the Unity toolset from the ground up, adding the skills you need to go from application coder to game developer. Based on Unity version 5.
Purchase of the print book includes a free eBook in PDF, Kindle, and...