Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Mastering Adobe Captivate 7
Mastering Adobe Captivate 7

Bring a new level of interactivity and sophistication to your e-learning content with the user-friendly features of Adobe Captivate. This practical tutorial will teach you everything from automatic recording to advanced tips and tricks.

Overview

  • Enhance your projects by adding interactivity, animations,...
iOS Hacker's Handbook
iOS Hacker's Handbook

Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS...

Wireless Communications: Signal Processing Perspectives
Wireless Communications: Signal Processing Perspectives
Signal processing algorithms and architectures have an increasingly important role to play in meeting the central challenges faced in the design of advanced wireless communication systems. In Wireless Communications: Signal Processing Perspectives, leaders in the field describe state-of-the-art research in applying signal processing methodologies...
Managing Worldwide Operations and Communications With Information Technology
Managing Worldwide Operations and Communications With Information Technology
A data warehouse consists of a set of materialized views that contain derived data from several data sources. Materialized views are beneficial because they allow efficient retrieval of summary data. However, materialized views need to be refreshed periodically in order to avoid staleness. During a materialized view refresh only changes to the base...
Expert Oracle Database Architecture: Oracle Database Programming 9i, 10g, and 11g Techniques and Solutions, Second Edition
Expert Oracle Database Architecture: Oracle Database Programming 9i, 10g, and 11g Techniques and Solutions, Second Edition

Now in its second edition, this best-selling book by Tom Kyte of Ask Tom fame continues to bring you some of the best thinking on how to apply Oracle Database to produce scalable applications that perform well and deliver correct results. Tom has a simple philosophy: you can treat Oracle as a black box and just stick data into...

JIRA 5.x Development Cookbook
JIRA 5.x Development Cookbook

This book is your one-stop resource for mastering JIRA extensions and customizations Overview Extend and customize JIRA; work with custom fields, workflows, reports, gadgets, JQL functions, plugins, and more Customize the look and feel of your JIRA user interface by adding new tabs, web items and sections, drop down menus, and more Master JQL...

Fundamentals of Global Positioning System Receivers: A Software Approach (Wiley Series in Microwave and Optical Engineering)
Fundamentals of Global Positioning System Receivers: A Software Approach (Wiley Series in Microwave and Optical Engineering)
All the expert guidance you need to understand, build, and operate GPS receivers

The Second Edition of this acclaimed publication enables readers to understand and apply the complex operation principles of global positioning system (GPS) receivers. Although GPS receivers are widely used in everyday life to aid in positioning and navigation,...

Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
The Concordance Database Manual (Expert's Voice)
The Concordance Database Manual (Expert's Voice)

As a document imaging database, Concordance 8 gives you the ability to search through otherwise unmanageable amounts of data to locate just the precise records necessary for the case at hand. The product also boasts extensive case analysis and organization features. This leaves you free to organize and manipulate crucial documents as you...

Pentaho 3.2 Data Integration: Beginner's Guide
Pentaho 3.2 Data Integration: Beginner's Guide

Pentaho Data Integration (a.k.a. Kettle) is a full-featured open source ETL (Extract, Transform, and Load) solution. Although PDI is a feature-rich tool, effectively capturing, manipulating, cleansing, transferring, and loading data can get complicated.

This book is full of practical examples that will help you to take advantage of...

Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy