Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Marine Corps Way: Using Maneuver Warfare to Lead a Winning Organization
The Marine Corps Way: Using Maneuver Warfare to Lead a Winning Organization

Perhaps the preeminent conventional fighting force in the world, the United States Marine Corps owes much of its modern-day success to the adoption of a combat philosophy known as maneuver warfare. Maneuver warfare uses speed, surprise, and concentrated force to exploit an opponent’s weakness and enables the Marines to achieve maximum...

UML For The IT Business Analyst, Second Edition
UML For The IT Business Analyst, Second Edition

Today, information-technology business analysts are often working on object-oriented (OO), Unified Modeling Language (UML) projects, yet they have a long way to go to exploit the technology beyond the adoption of use cases (just one part of the UML). This book explains how, as an IT business analyst, you can pull together all of the UML tools...

Network-Embedded Management and Applications: Understanding Programmable Networking Infrastructure
Network-Embedded Management and Applications: Understanding Programmable Networking Infrastructure

Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged.  At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers.  Now, however, the traditional framework...

Understanding Web Services Specifications and the WSE
Understanding Web Services Specifications and the WSE

Explore the emerging specifications—and the latest tools—for implementing advanced Web services using Microsoft technologies. Keep pace with evolving Web services specifications—and get developer-to-developer insights for using them to deliver advanced, interoperable solutions for Microsoft .NET. This guide provides a...

Learning Mambo: A Step-by-Step Tutorial to Building Your Website
Learning Mambo: A Step-by-Step Tutorial to Building Your Website
A well-structured and example-rich tutorial to creating websites using Mambo that is perfect for new Mambo users needing a clear a reassuring guide to this simple and yet powerful PHP and MySQL-based Open Source website content management system. Mambo is a mature and fully featured open-source Content Management System (CMS). Mambo is easy to use...
JUnit in Action, Second Edition
JUnit in Action, Second Edition

When JUnit was first introduced a decade ago by Kent Beck and Erich Gamma, the Agile movement was in its infancy, "Test Driven Development" was unknown, and unit testing was just starting to move into the typical developer's vocabulary. Today, most developers acknowledge the benefits of unit testing and rely on the...

OSSEC Host-Based Intrusion Detection Guide
OSSEC Host-Based Intrusion Detection Guide
November 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,...
X-Ray Spectrometry: Recent Technological Advances
X-Ray Spectrometry: Recent Technological Advances

During the last decade, remarkable and often spectacular progress has been made in the methodological and instrumental aspects of x-ray spectrometry. This progress includes considerable technological improvements in the design and production of detectors as well as significant advances in x-ray optics, special configurations and computing...

The Compiler Design Handbook: Optimizations & Machine Code Generation
The Compiler Design Handbook: Optimizations & Machine Code Generation

In the last few years, changes have had a profound influence on the problems addressed by compiler designers. First, the proliferation in machine architectures has necessitated the fine-tuning of compiler back ends to exploit features such as multiple memory banks, pipelines and clustered architectures. These features provide potential for...

General ultrasound in the critically ill
General ultrasound in the critically ill

Written by an intensivist familiar with ultrasound, this book describes a new clinical tool: ultrasound for the intensive care and emergency physician. It specifically details findings of immediate clinical relevance throughout its pages. This volume is not only an exhaustive atlas dealing with the most variable aspects of the critically ill...

Anywhere: How Global Connectivity is Revolutionizing the Way We Do Business
Anywhere: How Global Connectivity is Revolutionizing the Way We Do Business

Is your business prepared for the world of ANYWHERE?

“Companies are beginning to conceive, design, develop, and distribute products and services in profoundly new ways…But how to exploit this new connectivity? Read on.”
—From the Foreword by Don Tapscott, bestselling author of Grown Up
...

Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy