Home | Amazing | Today | Tags | Publishers | Years | Search 
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Maya Studio Projects Texturing and Lighting (Wiley Desktop Editions)
Maya Studio Projects Texturing and Lighting (Wiley Desktop Editions)
“Half of good lighting╇ is good texturing, and half of good texturing is good lighting” is my favorite sage advice to new animators. It’s difficult to separate the two areas of computer animation. Texturing—the re-creation of specific surface qualities through the application of shaders,...
Node for Front-End Developers
Node for Front-End Developers
Node.js has brought the JavaScript revolution of the past few years to the server. Java- Script, it turns out, has uses beyond the client, and many techniques for effective clientside development are applicable on the server side as well. Front-end developers can use their existing skills to work with Node today....
Adobe Creative Suite 5 Design Premium Digital Classroom, (Book and Video Training)
Adobe Creative Suite 5 Design Premium Digital Classroom, (Book and Video Training)

Adobe Creative Suite 5 (CS5) Design Premium is the leading software package for creating print, Web, and interactive content. It includes the perfect creative tools for designing and manipulating images, creating print layouts, building and maintaining web sites, and creating interactive and animated content. CS5 Design Premium includes the...

Apple Pro Training Series: Final Cut Pro X Advanced Editing
Apple Pro Training Series: Final Cut Pro X Advanced Editing

 

This book takes a hands-on approach to using the software. It’s divided into projects— based on footage on the accompanying DVD—that teach you advanced techniques as you work through the lessons. Every exercise is designed to get you editing and creating effects professionally
...
Deadline Fitness: Tone Up and Slim Down When Every Minute Counts
Deadline Fitness: Tone Up and Slim Down When Every Minute Counts

When I moved to Los Angeles from the East Coast, I was thrilled to have the opportunity to work in the entertainment industry. As I was studying and building my fitness business, my day job was as an assistant account executive at a Beverly Hills public relations firm. I spent lots of time with up-and-comers as well as with the most...

IBM Websphere Portal 8: Web Experience Factory and the Cloud
IBM Websphere Portal 8: Web Experience Factory and the Cloud
When I joined IBM in early 2001, WebSphere Portal was little more than an idea. But some believed this was going to be the future of web technology. When WebSphere Portal v1 was released later in that same year, spending the time required to cobble together the components needed to make it run, was an exercise in patience and...
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Information technologies are becoming pervasive and powerful to the point that the privacy of citizens is now at risk. Indeed, more and more of our daily transactions are conducted electronically and require us to transmit personal information. Examples include using an electronic identity card to prove one’s age in a...
Introducing iOS 8
Introducing iOS 8

Learn to make iOS apps even if you have absolutely no programming experience. This hands-on book takes you from idea to App Store, using real-world examples—such as driving a car or eating at a restaurant—to teach programming and app development. You’ll learn concepts through clear, concise, jargon-free...

Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy