Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...
Beginning Microsoft Visual C# 2008 (Wrox Beginning Guides)
Beginning Microsoft Visual C# 2008 (Wrox Beginning Guides)
The book is aimed at novice programmers who wish to learn programming with C# and the .NET framework. The book starts with absolute programming basics. It then moves into Web and Windows programming, data access (databases and XML), and more advanced technologies such as graphics programming with GDI+ and basic networking. The book is divided into...
Leadership by Choice: Increasing Influence and Effectiveness through Self-Management
Leadership by Choice: Increasing Influence and Effectiveness through Self-Management

Establish trust with your team by developing a clear decision-making strategy

Do you have the opportunity to focus on each decision you make? Chances are, you don't. All too often, our choices are rushed and relationships are strained by not thinking clearly or communicating properly.

We are all responsible...

Japan's Great Stagnation: Financial and Monetary Policy Lessons for Advanced Economies
Japan's Great Stagnation: Financial and Monetary Policy Lessons for Advanced Economies
After experiencing spectacular economic growth and industrial development for much of the postwar era, Japan plunged abruptly into recession in the early 1990s and since then has suffered a prolonged period of economic stagnation, from which it is only now emerging. Japan's malaise, marked by recession or weak economic activity, commodity and asset...
The Entrepreneur's Guide to Customer Development: A cheat sheet to The Four Steps to the Epiphany
The Entrepreneur's Guide to Customer Development: A cheat sheet to The Four Steps to the Epiphany

“This is a must read for all startups and stakeholders.”
Steve Blank, author of The 4 Steps to the Epiphany, creator of Customer Development methodology

“The Entrepreneur’s Guide is an easy read. It is written in a conversational tone, doesn’t take itself too
...

Python Network Programming: Conquer all your networking challenges with the powerful Python language
Python Network Programming: Conquer all your networking challenges with the powerful Python language

Power up your network applications with Python programming

Key Features

  • Master Python skills to develop powerful network applications
  • Grasp the fundamentals and functionalities of SDN
  • Design multi-threaded, event-driven architectures for echo and chat...
Unix and Linux: Visual QuickStart Guide (4th Edition)
Unix and Linux: Visual QuickStart Guide (4th Edition)
With Unix, 4th Edition: Visual QuickStart Guide, readers can start from the beginning to get a tour of the Unix operating system, or look up specific tasks to learn just what they need to know. This task-based, visual reference guide uses step-by-step instructions and plenty of screenshots, and includes three years worth of new material...
CCNP Switching Study Guide (2nd Edition; Exam 640-604 with CD-ROM)
CCNP Switching Study Guide (2nd Edition; Exam 640-604 with CD-ROM)
Here's the book you need to prepare for Cisco's new Switching exam, 640-604. Written by Cisco internetworking experts who can help you master the skills and acquire the knowledge needed to approach the test with confidence, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official exam...

Vatican assassins: "wounded in the house of my friends"
Vatican assassins: "wounded in the house of my friends"
Eric Jon Phelps gives the past and present diabolical history of the Society of Jesus. Its Second Thirty Years' War (1914-1945), including the Jewish, Lutheran, Orthodox and Buddhist Holocausts, was vengeance for the Order's expulsion from Europe and Asia during the Nineteenth Century.

Its Cold War was the coninuation of the killing of
...
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Building a Cisco Wireless LAN
Building a Cisco Wireless LAN
Wireless LAN (Wi-Fi) technology is significantly more complex than cordless telephony; loss, coverage, and bandwidth requirements are much more stringent and the proliferation of wireless LANs in corporate environments has resulted in interesting security challenges. IEEE 802.11-based products offered by Cisco Systems have quickly become one of the...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy