Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
On the Way to the Web: The Secret History of the Internet and Its Founders
On the Way to the Web: The Secret History of the Internet and Its Founders
On the Way to the Web: The Secret History of the Internet and Its Founders is an absorbing chronicle of the inventive, individualistic, and often cantankerous individuals who set the Internet free. Michael A. Banks describes how the online population created a new culture and turned a new frontier into their vision of the...
Skype Me!: From Single User to Small Enterprise and Beyond
Skype Me!: From Single User to Small Enterprise and Beyond
You are going to love Skype Me! From Single User to Small Enterprise and Beyond. Here’s why: Michael Gough knows his stuff. Michael has also completed a remarkably difficult project around a remarkably cool product, Skype.

Michael is a busy guy. I have no idea where he found time to write a
...
Scientology
Scientology
Scientology is arguably the most persistently controversial of all contemporary New Religious Movements. The Church of Scientology has been involved in battles over tax issues, a ten-year conflict with the Food and Drug Administration, extended turmoil with a number of European governments, and has even been subjected to FBI raids in Washington,...
The Numbers Behind NUMB3RS: Solving Crime with Mathematics
The Numbers Behind NUMB3RS: Solving Crime with Mathematics
Numb3rs looks like a winn3r.”
USA Today

The companion to the hit CBS crime series Numb3rs presents the fascinating way mathematics is used to fight real-life crime

Using the popular CBS prime-time TV crime series Numb3rs as a
...
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

The Art of Woo: Using Strategic Persuasion to Sell Your Ideas
The Art of Woo: Using Strategic Persuasion to Sell Your Ideas

You may need The Art of War to defeat your enemies, but if you prefer to win them over, read The Art of Woo

G. Richard Shell and Mario Moussa know what it takes to drive new ideas through complex organizations. They have advised thousands of executives from companies such as Google, Microsoft, and General
...

Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Our civilization runs on software. Yet the art of creating it continues to be a dark mystery, even to the experts, and the greater our ambitions, the more spectacularly we seem to fail.

Big software projects regularly crash and burn--just ask the FBI and the IRS, the Pentagon and the FAA, or any decent-size corporation. The...

CCNP BCRAN Exam Cram 2 (642-821)
CCNP BCRAN Exam Cram 2 (642-821)
Your resource to passing the Cisco CCNP BCRAN Certification Exam!

Join the ranks of readers who have trusted Exam Cram 2 to their certification preparation needs! The CCNP BCRAN Exam Cram 2 (Exam 642-821) is focused on what you need to know to pass the CCNP BCRAN exam. The Exam Cram 2 Method of Study provides you...

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

The thrilling memoir of the world's most wanted computer hacker

"Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed
...

Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy