Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Designer's Guide to VHDL, Volume 3, Third Edition (Systems on Silicon)
The Designer's Guide to VHDL, Volume 3, Third Edition (Systems on Silicon)
VHDL may sound like a new Internet language, but it really stands for VHSIC (Very High Speed Integrated Circuit) Hardware Definition Language. VHDL borrows ideas from software engineering (architectural, behavior, and formal models, as well as modular design) and is used to design today's custom integrated circuits, from cell phones to...
Absolute Beginner's Guide to Personal Firewalls
Absolute Beginner's Guide to Personal Firewalls

The Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal...

The Marketing Agency Blueprint: The Handbook for Building Hybrid PR, SEO, Content, Advertising, and Web Firms
The Marketing Agency Blueprint: The Handbook for Building Hybrid PR, SEO, Content, Advertising, and Web Firms

When I started HubSpot in June 2006 with my business partner, Dharmesh Shah, our experiences with marketing agencies led us to almost entirely avoid working with them. In fact, we designed our original business model around selling our marketing software directly to end customers, and developed an internal marketing team that would not be...

Sams Teach Yourself SQL in 24 Hours (3rd Edition)
Sams Teach Yourself SQL in 24 Hours (3rd Edition)

Sams Teach Yourself SQL in 24 Hours, Third Edition presents the key features of SQL (Structured Query Language) in an easy to understand format with updated code examples, notes, diagrams, exercises, and quizzes. New material covers more information on transactions, constructs, embedded databases, and object-oriented programming. In this...

Internet Security: A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers

Internet Security discusses not only the technology needed to support a solid security strategy, but also those policies and processes that must be incorporated in order for that strategy to work.

New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to...

Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Understanding Knowledge as a Commons: From Theory to Practice
Understanding Knowledge as a Commons: From Theory to Practice
Knowledge in digital form offers unprecedented access to information through the Internet but at the same time is subject to ever-greater restrictions through intellectual property legislation, overpatenting, licensing, overpricing, and lack of preservation. Looking at knowledge as a commons--as a shared resource--allows us to understand both its...
Foundation Website Creation with CSS, XHTML, and JavaScript
Foundation Website Creation with CSS, XHTML, and JavaScript
Coming to web development with a blank slate can be pretty intimidating. There are a lot of things to learn about the proper construction of a website. The most successful websites have a great deal of thought and work put into them before they’re even put into production.

Although it can be scary, there has never been a better
...
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501)
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501)

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

...

The Element of Fire
The Element of Fire
"The Element of Fire is a powerful fantasy." -- Locus Magazine, 1993

Scientific magic and fairy magic collide headlong in the threatened kingdom of Ile-Rien, where the Captain of the Queen's Guard fights a perilous battle standing between opposing forces seeking to topping the kingdom's young king. Reprint.
...
HackNotes(tm) Windows Security Portable Reference
HackNotes(tm) Windows Security Portable Reference

HackNotes Windows Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques used by criminals to break into computer networks. Understand how the attacks work, then learn how to access and strengthen your Windows systems through a series of tested and trusted anti-hacking methods,...

Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply...

unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy