Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...

The Old New Thing: Practical Development Throughout the Evolution of Windows
The Old New Thing: Practical Development Throughout the Evolution of Windows
Why does Windows work the way it does? Why is Shut Down on the Start menu? (And why is there a Start button, anyway?) How can I tap into the dialog loop? Why does the GetWindowText function behave so strangely? Why are registry files called "hives"?

Many of Windows' quirks have perfectly logical explanations, rooted in...

Out of Joint: A Private and Public Story of Arthritis (American Lives)
Out of Joint: A Private and Public Story of Arthritis (American Lives)
She begins, in the morning, by casing her joints: Can her ankles take the stairs? Will her fingers open a jar? Peel an orange? But it was not always this way for Mary Felstiner, who went to bed one night an active professional and healthy young mother, and woke the next morning literally out of joint. With wrists and elbows no longer...
Hacking Photoshop CS2
Hacking Photoshop CS2
You think you know Photoshop? Wait until you see how these over-the-top hacks and mods bring out its hidden power! Create a workflow customized for your specific needs. Superimpose type in half the time. Make Bridge work for you. Hack Camera Raw and get even more from your images. Print your projects without losing precision. When you can command...
Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
Knowledge-Based Software Engineering:  Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
Knowledge-Based Software Engineering: Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering
This article proposes an automatic generation method of relation matrix for Interpretive Structural Modelling (ISM), which is a popular tool widely used for visualising problem structure, problem structure analysis, and decision making. In ISM, problems are divided into sub problems. Then hierarchy relations are introduced into the set of sub...
Beautiful Architecture: Leading Thinkers Reveal the Hidden Beauty in Software Design
Beautiful Architecture: Leading Thinkers Reveal the Hidden Beauty in Software Design
What are the ingredients of robust, elegant, flexible, and maintainable software architecture? Beautiful Architecture answers this question through a collection of intriguing essays from more than a dozen of today's leading software designers and architects. In each essay, contributors present a notable software architecture, and analyze...
Don't Get Bitten: The Dangers of Things That Bite or Sting
Don't Get Bitten: The Dangers of Things That Bite or Sting
Loaded with information on how to avoid...venom and...as well as practical tips, for staying safe from those bites. -- Billings Gazette

The little book loaded with information on how to avoid or deal with bites and stings in the great outdoors.

Includes:
Practical tips on staying safe from dangerous bites
...

The Offshoring Challenge: Strategic Design and Innovation for Tomorrow's Organization
The Offshoring Challenge: Strategic Design and Innovation for Tomorrow's Organization

The continuous search for efficiency gains and the goal of attaining a sustainable competitive advantage have steadily increased the volume of goods and services procured globally from third party vendors. In this context, named as “the next wave of globalization”, the offshoring phenomenon has stimulated research and political...

Home Closing Checklist
Home Closing Checklist

 A concise, quick-reference guide to save money and headaches when closing on a home

Fraught with arcane rituals, hidden traps and pitfalls, and confusing legal mumbo jumbo, the closing can be the most harrowing part of the home buying...

Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

iPad Made Simple
iPad Made Simple

Get the most out of your iPad with iPad Made Simple—learn all the key features, understand what’s new, and utilize dozens of time-saving tips and tricks. This book includes over 740 pages of easy-to-read instructions and over 1,000 carefully annotated screen shots to guide you to iPad mastery.

With iPad...

unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy