Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use
Hacking Healthcare: A Guide to Standards, Workflows, and Meaningful Use

Ready to take your IT skills to the healthcare industry? This concise book provides a candid assessment of the US healthcare system as it ramps up its use of electronic health records (EHRs) and other forms of IT to comply with the government’s Meaningful Use requirements. It’s a tremendous opportunity for tens of...

Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists
Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists

Bring your electronic inventions to life!

"This full-color book is impressive...there are some really fun projects!" -GeekDad, Wired.com

Who needs an electrical engineering degree? This intuitive guide shows how to wire, disassemble, tweak, and re-purpose everyday devices quickly and easily. Packed with...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways...
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Certified Ethical Hacker Exam Prep
Certified Ethical Hacker Exam Prep

The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage...

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Hacking the PSP: Cool Hacks, Mods, and Customizations for the Sony Playstation Portable
Hacking the PSP: Cool Hacks, Mods, and Customizations for the Sony Playstation Portable
You hold in your hand the Holy Grail for PSP aficionados—300 pages of ways to have even more fun with that little handheld powerhouse than the manufacturer intended. Use it as a hard drive. Surf the Web wirelessly. Play your own movies in the palm of your hand. Build your own battery pack. Run homebrew apps. And we're just getting started....
Linux Performance Tuning and Capacity Planning (Kaleidoscope)
Linux Performance Tuning and Capacity Planning (Kaleidoscope)

Covering topics from analysis tools to kernel tuning, to capacity management, this book offers a single point of reference for what you need to know. Anyone who has ever had to speed existing operations or project usage patterns for future loads, knows that tracking down the relevant information can be a difficult task. That's why this book has...

Big Book of Apple Hacks: Tips & Tools for Unlocking the Power of Your Apple Devices
Big Book of Apple Hacks: Tips & Tools for Unlocking the Power of Your Apple Devices
Ostensibly, you buy a computer or gadget to get something done. The something might be as simple as listening to MP3s you’ve ripped from your CD collection or as challenging as creating a full-length feature film. Apple is happy to sell you products to meet your needs. The trouble is your needs aren’t...
Innovation Happens Elsewhere: Open Source as Business Strategy
Innovation Happens Elsewhere: Open Source as Business Strategy
It's a plain fact: regardless of how smart, creative, and innovative your organization is, there are more smart, creative, and innovative people outside your organization than inside. Open source offers the possibility of bringing more innovation into your business by building a creative community that reaches beyond the barriers of the business....
unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy