Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

The Definitive Guide to SQLite (Expert's Voice in Open Source)
The Definitive Guide to SQLite (Expert's Voice in Open Source)

The Definitive Guide to SQLite, Second Edition is your one-stop resource for integrating one of the most advanced and innovative open source database management systems into your development projects. SQLite is freely-available and comes with an amazingly small foot print of less than 300 kilobytes for a full-blown implementation....

Reason in Action (Collected Essays, Vol. 1)
Reason in Action (Collected Essays, Vol. 1)

Reason in Action collects John Finnis' work on the theory of practical reason and moral philosophy. The essays in the volume range from foundational issues of meta-ethics to the practical application of natural law theory to ethical problems such as nuclear deterrence, obscenity and free speech, and abortion and cloning.
...

Ransomware: Defending Against Digital Extortion
Ransomware: Defending Against Digital Extortion

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the...

Tech Job Hunt Handbook: Career Management for Technical Professionals
Tech Job Hunt Handbook: Career Management for Technical Professionals

Tech Job Hunt Handbook is a career management book—just for technology professionals—that reflects today’s new economic realities. The world of work is constantly changing, and staying professionally relevant while competing for more specialized tech jobs in areas like cloud computing, mobile and social...

Seeing Dark Things: The Philosophy of Shadows
Seeing Dark Things: The Philosophy of Shadows
If a spinning disk casts a round shadow does this shadow also spin? When you experience the total blackness of a cave, are you seeing in the dark? Or are you merely failing to see anything (just like your blind companion)?

Seeing Dark Things uses visual riddles to explore our ability to see shadows, silhouettes, and black birds--plus
...
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Advanced Penetration Testing for Highly-Secured Environments - Second Edition

Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments

About This Book

  • Learn how to build your own pentesting lab environment to practice advanced techniques
  • Customize your own scripts, and learn methods to exploit 32-bit and 64-bit...
Osteoarthritis: Diagnosis and Medical / Surgical Management
Osteoarthritis: Diagnosis and Medical / Surgical Management
Written by the foremost experts, this text is a comprehensive clinical reference on osteoarthritis. Chapters review current information on the epidemiology, etiopathogenesis, and pathology of osteoarthritis, the biochemistry and molecular and cell biology of articular cartilage, and experimental models of osteoarthritis. Major sections focus on...
Trust-Based Selling: Finding and Keeping Customers for Life
Trust-Based Selling: Finding and Keeping Customers for Life

The first year of developing a new sales territory or establishing new customers is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on products, grab a customer list, start calling for appointments, discover opportunities, and close deals. In...

Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)
Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)

Publius Syrus stated back in 42 B.C., “You cannot put the same shoe on every foot.” (Maxim 596) Though written long before the advent of forensic science, Syrus’ maxim summarizes the theme of Forensic Medicine of the Lower Extremity: Human Identification and Trauma Analysis of the Thigh, Leg, and Foot. Put simply, the lower...

The Focal Easy Guide to Final Cut Pro 6
The Focal Easy Guide to Final Cut Pro 6
"This book will help you learn how to use Final Cut Pro 5 quickly and confidently." - Stills Audio Motion

"In such a relatively short book as compared to the 800 page tomes I usually find, there is not much that Rick Young does not cover in order to get the new user up and running as soon and as painlessly as
...
Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
Result Page: 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy