Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Fundamentals of Complex Analysis  with Applications to Engineering,  Science, and Mathematics (3rd Edition)
Fundamentals of Complex Analysis with Applications to Engineering, Science, and Mathematics (3rd Edition)
This book provides a comprehensive introduction to complex variable theory and its applications to current engineering problems and is designed to make the fundamentals of the subject more easily accessible to readers who have little inclination to wade through the rigors of the axiomatic approach. Modeled after standard calculus books--both in...
Bioinformatics Biocomputing and Perl: An Introduction to Bioinformatics Computing Skills and Practice
Bioinformatics Biocomputing and Perl: An Introduction to Bioinformatics Computing Skills and Practice

Bioinformatics, Biocomputing and Perl presents an extended tutorial introduction to programming through Perl, the premier programming technology of the bioinformatics community. Even though no previous programming experience is assumed, completing the tutorial equips the reader with the ability to produce powerful custom...

Filmmaking For Dummies (Career/Education)
Filmmaking For Dummies (Career/Education)
"I found Filmmaking For Dummies a thorough and informative read: a complete A to Z that demystifies not only production, but pre- and post- production as well. Stoller paints a picture of filmmaking so basic that you'd have to be not just a dummy but completely braindead if you're unable to make your own movie after closing the...
Light It, Shoot It, Retouch It: Learn Step by Step How to Go from Empty Studio to Finished Image (Voices That Matter)
Light It, Shoot It, Retouch It: Learn Step by Step How to Go from Empty Studio to Finished Image (Voices That Matter)
FOR THE FIRST TIME EVER, YOU’LL LEARN ALL THREE ASPECTS OF WHAT IT TAKES TO CREATE STUNNING PORTRAITS
(HINT: IT’S NOT JUST THE LIGHTING)

Scott Kelby, the world’s #1 best-selling author of photography books, Editor-in-Chief and Publisher of Photoshop User...

Home Recording Studio  Build it Like the Pros
Home Recording Studio Build it Like the Pros
With the advances in digital technology, musicians can now produce their own music. But the gear is only part of the equation when it comes to recording and mixing. The next part is finding a soundproof room that you can produce it in. Unfortunately, any old room in your house will not suffice for a quality recording. Without a decent room, you'l...
The Driver: My Dangerous Pursuit of Speed and Truth in the Outlaw Racing World
The Driver: My Dangerous Pursuit of Speed and Truth in the Outlaw Racing World

On his deathbed, Alex Roy's father dropped tantalizing hints about the notorious Cannonball Run of the 1970s, the utterly illegal high-speed nonstop race from New York to L.A. that was nothing at all like the one portrayed in the Burt Reynolds movie.

Inspired by his father's dying words, and against the advice of his loyal,...

Podcasting: Do It Yourself Guide
Podcasting: Do It Yourself Guide
It's your show, and you can do what you want

Got something to tell the world? Want unlimited listening options? Podcasting makes it happen. It's the hottest communication trend of the twenty-first century, and one of the first guys to jump on board is ready to get you started. Todd helps you choose software, subscribe to the best podcasts,...

The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients

  • A complete resource for understanding VPN components and VPN design issues

  • Understand state-of-the-art...

Upgrading and Repairing Servers
Upgrading and Repairing Servers

Servers are the heart and soul of businesses today. Scott and Jarret tackle the confusing array of server design form factors, power supplies, rack mounts, dual processor setups, RAID, blade technology, InfiniBand, clustering, load balancing and replication. The authors address these topics from an OS-neutral standpoint, focusing solely on how...

Visual C# Game Programming for Teens
Visual C# Game Programming for Teens

Imagine this scenario: You create a hunter character with random stats and hit points and enter the dungeon to begin exploring for treasure. You stumble upon a zombie pacing near a pile of gear and gold! You attack the zombie and it strikes back! You roll 1D20 and score a critical hit! The 20 point die plus dexterity, against the...

Encyclopedia of Civil War Shipwrecks
Encyclopedia of Civil War Shipwrecks
On the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,...
Result Page: 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy