Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job
It's not a job. It's THE job, and here's how to get it.

What does your ideal IT security job look like? What will prospective employers expect you to know? What affects how they view you and your skills? What if you haven't had much experience? What if you're not 30 anymore?

Here's the crash course in how to...

Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Experience the Message: How Experiential Marketing Is Changing the Brand World
Experience the Message: How Experiential Marketing Is Changing the Brand World
Consumers — exposed to roughly four thousand marketing messages a day — are no longer willing to be part of a passive consumer base, subject to conventional advertising and marketing. Rather, they are joining a growing tribe of brand atheists who don't want to be targeted by impersonal messages. They want dialogue, which...
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering,...
Rich Internet Applications with Adobe Flex & Java (Secrets of the Masters)
Rich Internet Applications with Adobe Flex & Java (Secrets of the Masters)
At the beginning of the decade Macromedia coined the term rich Internet application (RIA) to describe the future of applications. An RIA is a Web experience that’s engaging, interactive, lightweight, and flexible. RIAs offer the flexibility and ease of use of an intelligent desktop application and add the broad reach of traditional Web...
Microsoft Excel VBA Programming for the Absolute Beginner, Second Edition
Microsoft Excel VBA Programming for the Absolute Beginner, Second Edition
Visual Basic for Applications (VBA for short) is a programming environment
designed to work with Microsoft’s Office applications (Word, Excel,
Access, and PowerPoint). Components in each application (for example,
worksheets or documents) are exposed as objects to the programmer to use and
manipulate to a desired end.
...
Garbage and Recycling (Introducing Issues With Opposing Viewpoints)
Garbage and Recycling (Introducing Issues With Opposing Viewpoints)

Indulging in a wide spectrum of ideas, beliefs, and perspectives is a critical cornerstone of democracy. After all, it is often debates over differences of opinion, such as whether to legalize abortion, how to treat prisoners, or when to enact the death penalty, that shape our society and drive it forward. Such diversity of thought is...

Understanding Exposure: How to Shoot Great Photographs with a Film or Digital Camera (Updated Edition)
Understanding Exposure: How to Shoot Great Photographs with a Film or Digital Camera (Updated Edition)
For serious amateur photographers who already shoot perfectly focused, accurately exposed images but want to be more creative with a camera, here’s the book to consult. More than seventy techniques, both popular and less-familiar approaches, are covered in detail, including advanced exposure, bounced flash and candlelight, infrared, multiple...
Hacking exposed web applications, 3rd Edition
Hacking exposed web applications, 3rd Edition

There is no escaping the reality that businesses live on the Web today. From banks to bookstores, from auctions to games, the Web is the place where most businesses ply their trade. For consumers, the Web has become the place where they do the majority of their business as well. For example, nearly 50 percent of all retail music sales in the...

Penetration Tester's Open Source Toolkit
Penetration Tester's Open Source Toolkit
This is the first fully integrated Penetration Testing book and bootable Linux CD containing the Auditor Security Collection which includes over 300 of the most effective and commonly used open source attack and penetration testing tools. This powerful tool kit and authoritative reference is written by the security industry's foremost...
Color Imaging: Fundamentals and Applications
Color Imaging: Fundamentals and Applications

Color is one of the most fascinating areas to study. Color forms an integral part of nature, and we humans are exposed to it every day. We all have an intuitive understanding of what color is, but by studying the underlying physics, chemistry, optics, and human visual perception, the true beauty and complexity of color can be...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy