Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
Advanced Topics in Electronic Commerce
Advanced Topics in Electronic Commerce
The Advanced Topics in Electronic Commerce Series provides comprehensive coverage and understanding of the social, cultural, organizational, human, and cognitive impacts of the EC technologies and advances on organizations around the world. These impacts include those of EC on consumer behavior as well as on organizational behavior, development,...
Killer Web Content: Make the Sale, Deliver the Service, Build the Brand
Killer Web Content: Make the Sale, Deliver the Service, Build the Brand
"Genius! Gerry McGovern gets it! If you read one book on managing a website, this is it. A must read for any web manager in any organization, large or small, government or private."-Bev Godwin, director of FirstGov.gov

Written by an internationally acclaimed specialist in this field, Killer Web Content provides the strategies...

Historical Dictionary of Terrorism (Historical Dictionaries of Religions, Philosophies and Movements)
Historical Dictionary of Terrorism (Historical Dictionaries of Religions, Philosophies and Movements)
Terrorism has consistently dogged this supposedly modern and enlightened age. It has merely adopted new shapes and forms in keeping with the times. The causes have also evolved over the years, as old problems are solved and new ones created. Moreover, it has gone high-tech, like everything else. Thus, as this book convincingly shows, terrorism will...
The Caucasus - An Introduction (Routledge Contemporary Russia and Eastern Europe Series)
The Caucasus - An Introduction (Routledge Contemporary Russia and Eastern Europe Series)

The Caucasus is one of the most complicated regions in the world: with many different peoples and political units, differing religious allegiances, and frequent conflicts, and where historically major world powers have clashed with each other. Until now there has been no single book for those wishing to learn about this complex region. This book...

The Official Ubuntu Book (7th Edition)
The Official Ubuntu Book (7th Edition)

Ubuntu is a complete, free operating system that emphasizes ease of use, community, and support while enhancing speed, power, and flexibility. It is designed for everyone from computer novices to experts.

This title serves a wide audience: novices who just want to test the waters and give Ubuntu a try,...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Data Mining with Rattle and R: The Art of Excavating Data for Knowledge Discovery (Use R!)
Data Mining with Rattle and R: The Art of Excavating Data for Knowledge Discovery (Use R!)
Data Mining and Anlaytics are the foundation technologies for the new knowledge based world where we build models from data and databases to understand and explore our world. Data mining can improve our business, improve our government, and improve our life and with the right tools, any one can begin to explore this new technology, on the path...
Inspectors and Enforcement at the Front Line of Government
Inspectors and Enforcement at the Front Line of Government
This book explores the social dynamics of the interaction between inspectors and their inspectees in the public sector. Government inspectors have a crucial role in enforcing rules and standards. The role of inspectors has changed. Their task is no longer to merely inspect and enforce, but also to educate, to negotiate, and to make compromises....
Wireless Sensor Networks: Technology, Protocols, and Applications
Wireless Sensor Networks: Technology, Protocols, and Applications
Infrastructure for Homeland Security Environments

Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way...

Preventing Good People From Doing Bad Things: Implementing Least Privilege
Preventing Good People From Doing Bad Things: Implementing Least Privilege

In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into...

Defining and Deploying Software Processes
Defining and Deploying Software Processes
I gravitated into the process world several years ago after performing
almost all roles in the software engineering environment — both as a
programmer and in various management positions. That environment
covered both the commercial software development world and the government
contracting software development world. I
...
unlimited object storage image
Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy