Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Encyclopedia of Civil War Shipwrecks
Encyclopedia of Civil War Shipwrecks
On the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,...
Circuit-Bending: Build Your Own Alien Instruments (ExtremeTech)
Circuit-Bending: Build Your Own Alien Instruments (ExtremeTech)
Fans will get bent out of shape if they miss the first book to cover circuit-bending-""bending,"" for short-the method by which an electronic toy or a device such as a keyboard is short-circuited and modified to create an entirely different sound Written by the inventor of the technology, this book covers the tools of the...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
iOS Hacker's Handbook
iOS Hacker's Handbook

Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS...

Beat the Forex Dealer: An insider's look into trading today's foreign exchange market
Beat the Forex Dealer: An insider's look into trading today's foreign exchange market

The foreign-exchange market is often referred to as the Slaughterhouse where novice traders go to get 'chopped up'. It is one of egos and money, where millions of dollars are won and lost every day and phones are routinely thrown across hectic trading desks. This palpable excitement has led to the explosion of the retail FX market,...

Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Trust-Based Selling: Finding and Keeping Customers for Life
Trust-Based Selling: Finding and Keeping Customers for Life

The first year of developing a new sales territory or customer list is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on product, grab a customer list, start calling for appointments, discover opportunities, and close deals. In fact, almost every sales model out there is based on nothing...

Connections: Patterns of Discovery
Connections: Patterns of Discovery
Every since the fl int axe triggered the Paleolithic Revolution over two million years ago we have lived by a culture of scarcity. Technology shortfall placed innovative capability in the hands of only a few: those who provided their hunter - gatherer communities with tools for hunting and butchering; then those who could read and write; then, much...
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
...
Building Arduino Projects for the Internet of Things: Experiments with Real-World Applications
Building Arduino Projects for the Internet of Things: Experiments with Real-World Applications

Gain a strong foundation of Arduino-based device development, from which you can go in any direction according to your specific development needs and desires. You'll build Arduino-powered devices for everyday use, and then connect those devices to the Internet. 

You'll be introduced to the building...

In Pursuit of the Traveling Salesman: Mathematics at the Limits of Computation
In Pursuit of the Traveling Salesman: Mathematics at the Limits of Computation

What is the shortest possible route for a traveling salesman seeking to visit each city on a list exactly once and return to his city of origin? It sounds simple enough, yet the traveling salesman problem is one of the most intensely studied puzzles in applied mathematics--and it has defied solution to this day. In this book, William Cook...

Trust-Based Selling: Finding and Keeping Customers for Life
Trust-Based Selling: Finding and Keeping Customers for Life

The first year of developing a new sales territory or establishing new customers is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on products, grab a customer list, start calling for appointments, discover opportunities, and close deals. In...

unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy