Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Medical Response to Terrorism: Preparedness and Clinical Practice
Medical Response to Terrorism: Preparedness and Clinical Practice
Even two decades ago, few would have imagined that terrorism would be planned and carried out on such an enormous scale as it is today. Terrorist attacks rely on horror and surprise, invoking different times, places, victims, and methods. Their purpose is to cause widespread confusion, fear, injury, and death. They disrupt security,...
The Gathering Storm (Wheel of Time, Book 12)
The Gathering Storm (Wheel of Time, Book 12)

Tarmon Gai’don, the Last Battle, looms. And mankind is not ready.

The final volume of the Wheel of Time, A Memory of Light, was partially written by Robert Jordan before his untimely passing in 2007. Brandon Sanderson, New York Times bestselling author of the Mistborn books, was
...

Grammar Snobs Are Great Big Meanies: A Guide to Language for Fun and Spite
Grammar Snobs Are Great Big Meanies: A Guide to Language for Fun and Spite
The antidote to Eats, Shoots and Leaves—an uproarious and very American language book for those who are tired of getting pulled over by the grammar police

What do suicidal pandas, doped-up rock stars, and a naked Pamela Anderson have in common? They’re all a heck of a lot more interesting than
...
The Next 100 Years: A Forecast for the 21st Century
The Next 100 Years: A Forecast for the 21st Century

A fascinating, eye-opening and often shocking look at what lies ahead for the U.S. and the world from one of our most incisive futurists.
 
In his thought-provoking new book, George Friedman, founder of STRATFOR—the preeminent private intelligence and forecasting firm—focuses on what he knows best, the future.
...

Unity 2017 Game Development Essentials - Third Edition: Build fully functional 2D and 3D games with realistic environments, sounds, physics, special effects, and more!
Unity 2017 Game Development Essentials - Third Edition: Build fully functional 2D and 3D games with realistic environments, sounds, physics, special effects, and more!
Game engines such as Unity are the power tools behind the games we know and love. Unity is one of the most widely used and best loved packages for game development and is used by everyone, from hobbyists to large studios, to create games and interactive experiences for the web, desktops, mobiles, and consoles. With...
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis

Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves...

Ethical and Social Issues in the Information Age (Texts in Computer Science)
Ethical and Social Issues in the Information Age (Texts in Computer Science)
As I wrote in my second edition preface, since the publication of the second edition in 2003, there have been tremendous changes in the fields of computer science and information sciences. During this period, we have become more dependent on computer and telecommunication technology than ever before. As we, individually and as nations, become more...
Steal This File Sharing Book
Steal This File Sharing Book

Steal This File Sharing Book tackles the thorny issue of file sharing, explaining how file sharing networks work and how to use them safely and effectively. There’s a wealth of free material available online—music, movies books, software, video games, even pornography. But do you know where to find that rare song...

Smart Clothing: Technology and Applications (Human Factors and Ergonomics)
Smart Clothing: Technology and Applications (Human Factors and Ergonomics)

GPS-embedded clothing for finding children or skiers when they are lost, bio-monitoring smart shirts, and vests that monitor a patient’s vital signs are no longer science fiction but science fact. It is quite likely that within 20 or 30 years, computers, telephones, and televisions will be a part of our intimate clothing. Covering the...

BlackBerry Planet: The Story of Research in Motion and the Little Device that Took the World by Storm
BlackBerry Planet: The Story of Research in Motion and the Little Device that Took the World by Storm

BlackBerry Planet is a new tribe of people who simply cannot get along without their favorite device, Research in Motion’s innovative electronic organizer, the BlackBerry. This omnipresent device has gone beyond being the world’s foremost mobile business tool and entered the consumer mainstream as the Swiss Army Knife of smart...

How Do I Save My Honor?: War, Moral Integrity, and Principled Resignation
How Do I Save My Honor?: War, Moral Integrity, and Principled Resignation
"A fascinating and urgently needed exploration of moral responsibility in wartime, focusing on the complex realities and demands since 9/11. This engagingly written and well-researched study challenges each of us to honor our better selves." --Richard Falk, University of California, Santa Barbara

"Felice has written the
...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy