Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

Open Sources: Voices from the Open Source Revolution
Open Sources: Voices from the Open Source Revolution
Open Sources: Voices from the Open Source Revolution is a fascinating look at the raging debate that is its namesake. Filled with writings from the central players--from Linux creator Linus Torvalds to Perl creator Larry Wall--the book convinces the reader of the overwhelming merits of freeing up the many iterations of software's source...
God and Empire: Jesus Against Rome, Then and Now
God and Empire: Jesus Against Rome, Then and Now
At the heart of the Bible is a moral and ethical call to fight unjust superpowers, whether they are Babylon, Rome, or even America.

From the divine punishment and promise found in Genesis through the revolutionary messages of Jesus and Paul, John Dominic Crossan reveals what the Bible has to say about land and economy, violence and...

Ajax And Php: Building Responsive Web Applications
Ajax And Php: Building Responsive Web Applications
AJAX is a complex phenomenon that means different things to different people. Computer users appreciate that their favorite websites are now friendlier and feel more responsive. Web developers learn new skills that empower them to create sleek web applications with little effort. Indeed, everything sounds good about AJAX!

At its roots,
...
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
Faith, Politics, and Power: The Politics of Faith-Based Initiatives
Faith, Politics, and Power: The Politics of Faith-Based Initiatives

There is often more than meets the eye where politics, religion and money are concerned. This is certainly the case with the Faith-Based Initiative. Section 104, a small provision of the 1996 Welfare Reform bill called "Charitable Choice," was the beginning of what we now know as the Faith-Based Initiative. In its original form, the...

Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

The Secret Wars of Judi Bari: A Car Bomb, the Fight for the Redwoods, and the End of Earth First
The Secret Wars of Judi Bari: A Car Bomb, the Fight for the Redwoods, and the End of Earth First
Takes the reader inside the often bizarre world of the Earth First! Movement and the back to nature counterculture of California's North Coast.

Kate Coleman traces Judi Bari's rise from college activist to would-be Mother Jones of the Redwoods. Drawing on extensive interviews with Bari's friends and comrades as well as critics, Coleman
...
Inventor's Guide to Law, Business & Taxes
Inventor's Guide to Law, Business & Taxes
Hungry for cash, John "Doc" Pemberton sold the world's most famous trade secret -- the formula for Coca-Cola, for less than $900. Charles Goodyear had a brilliant innovation -- rubber that could be used year-round. But Goodyear made many bad deals, failed to protect his patent rights and died in 1860 owing over...
Garbage and Recycling (Introducing Issues With Opposing Viewpoints)
Garbage and Recycling (Introducing Issues With Opposing Viewpoints)

Indulging in a wide spectrum of ideas, beliefs, and perspectives is a critical cornerstone of democracy. After all, it is often debates over differences of opinion, such as whether to legalize abortion, how to treat prisoners, or when to enact the death penalty, that shape our society and drive it forward. Such diversity of thought is...

Love 'Em or Lose 'Em, Sixth Edition: Getting Good People to Stay
Love 'Em or Lose 'Em, Sixth Edition: Getting Good People to Stay
This sixth edition of the number one bestselling employee retention book in the world (over 800,000 copies sold) puts a new emphasis on diversity and inclusion but keeps the same appealing format: twenty-six simple strategies from A to Z.

Despite booms and busts, technology advances, talent wars, layoffs, and even a
...
The Interplay Between Political Theory and Movies: Bridging Two Worlds
The Interplay Between Political Theory and Movies: Bridging Two Worlds

This book presents essays and scientific contributions examining the link between popular media and politics. The essays focus on the question of how political and social change, concepts of power, and utopian elements are reflected in selected films and television series. The book applies a political science perspective, covering...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy