Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Risk Assessment of Chemicals: An Introduction
Risk Assessment of Chemicals: An Introduction

At last – a second edition of this hugely important text that reflects the progress and experience gained in the last decade and aims at providing background and training material for a new generation of risk assessors. The authors offer an introduction to risk assessment of chemicals as well as basic background information on sources,...

Greatest Guide to Photography: Because It's More Than Pushing the Button (Greatest Guides)
Greatest Guide to Photography: Because It's More Than Pushing the Button (Greatest Guides)

Photography tips and advice to help you... + add wow to your images with simple, little-known techniques that change a good shot into a great shot + get pin-sharp, perfectly composed & correctly exposed images, time and time again + choose the best camera and identify only those essential accessories + take stunning portraits of your...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Principles of Digital Image Processing: Advanced Methods (Undergraduate Topics in Computer Science)
Principles of Digital Image Processing: Advanced Methods (Undergraduate Topics in Computer Science)

This textbook is the third of three volumes which provide a modern, algorithmic introduction to digital image processing, designed to be used both by learners desiring a firm foundation on which to build, and practitioners in search of critical analysis and concrete implementations of the most important techniques. This volume builds upon the...

The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
I graduated from Long Island University in 1991 with a bachelor’s degree in political science. In the years since, much of the specifi c material I learned has been forgotten in the whirlwind of family and career life. Even so, there are some important lessons I still recall. Dr. Donald Baker often told us undergraduate students that states...
Frommer's Cambodia & Laos (Frommer's Complete)
Frommer's Cambodia & Laos (Frommer's Complete)

This new first edition guide introduces two exotic destinations fast becoming required stops for globetrotting tourists. Through our expert author, readers are exposed to the rich culture and poignant history in Cambodia and Laos. Discover the region's food and gift markets, lovely beaches and islands, colorful temples, and charming...

Investing Without Borders: How Six Billion Investors Can Find Profits in the Global Economy
Investing Without Borders: How Six Billion Investors Can Find Profits in the Global Economy

An insightful examination of the skills needed to be a proactive investor and find diverse investment opportunities in the emerging economy

There is no little league on Wall Street and no white belts. Here or abroad, you are put in immediately with the black belts – the best and the brightest. Think like an amateur and they...

Human-in-the-Loop Simulations: Methods and Practice
Human-in-the-Loop Simulations: Methods and Practice

Both the editors of this book were exposed to human-in-the-loop simulations while pursuing their doctoral degrees in the Center for Human-Machine Systems at Georgia Tech. In fact, S. Narayanan served as Ling Rothrock’s teaching assistant for the simulation course taught by Prof. Christine Mitchell. It has been over 15 years...

Mathematica by Example
Mathematica by Example
Mathematica bv Example is intended to bridge the gap which has existed between the very elementary handbooks available on Mathematica and those reference books written for the more advanced Mathematica users. This book is an extension of a manuscript which was developed to quickly introduce enough Mathematica commands to a group of...
A Guide to MATLAB Object-Oriented Programming
A Guide to MATLAB Object-Oriented Programming
I am an admitted object-oriented fanatic. I have been designing and implementing object-oriented software for more than twenty years. When I started designing and implementing object-oriented MATLAB®, I encountered many detractors. They would say things like “The object model isn’t complete,” “You can’t have public...
Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy