Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human...

Arabs: A 3,000-Year History of Peoples, Tribes and Empires
Arabs: A 3,000-Year History of Peoples, Tribes and Empires
A riveting, comprehensive history of the Arab peoples and tribes that explores the role of language as a cultural touchstone

This kaleidoscopic book covers almost 3,000 years of Arab history and shines a light on the footloose Arab peoples and tribes who conquered lands and disseminated their language and culture
...
Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Portrait of a Killer: Jack the Ripper -- Case Closed
Portrait of a Killer: Jack the Ripper -- Case Closed

The number-one New York Times-bestselling novelist Patricia Cornwell is known the world over for her brilliant storytelling, the courage of her characters, and the state-of-the-art forensic methods they employ.

In this headline-making new work of nonfiction, Cornwell turns her trademark skills for meticulous research
...

Eating the IT Elephant: Moving from Greenfield Development to Brownfield
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems

 

For every IT executive, manager, architect, program leader, project leader, and lead analyst

 

...
Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Social Semantics: The Search for Meaning on the Web (Semantic Web and Beyond)
Social Semantics: The Search for Meaning on the Web (Semantic Web and Beyond)

Social Semantics: The Search for Meaning on the Web provides a unique introduction to identity and reference theories of the World Wide Web, through the academic lens of philosophy of language and data-driven statistical models. The Semantic Web is a natural evolution of the Web, and this book covers the URL-based Web architecture...

Lighttpd
Lighttpd

LightTPD is a secure, flexible, and most importantly, light web server designed and optimized for high performance environments. It is open-source and licensed under the revised BSD license. Its event-driven architecture optimized for a large number of parallel connections, its advanced features (FastCGI, CGI, Auth, Output Compression, URL...

Amazon Web Services Made Simple: Learn how Amazon EC2, S3, SimpleDB and SQS Web Services enables you to reach business goals faster
Amazon Web Services Made Simple: Learn how Amazon EC2, S3, SimpleDB and SQS Web Services enables you to reach business goals faster
Hundreds of thousands of customers have joined the Amazon Web Services™ community in order to build solutions for their businesses. The AWS cloud computing platform provides the flexibility to build your application, your way, regardless of your use case or industry. You can save time, money, and the difficulties of managing your own...
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it...

Encyclopedia of Creation Myths
Encyclopedia of Creation Myths

A myth is a narrative projection of a given cultural group's sense of its sacred past and its significant relationship with the deeper powers of the surrounding world and universe. A myth is a projection of an aspect of a culture's soul. In its complex but revealing symbolism, a myth is to a culture what a dream is to an...

Pattern Recognition with Neural Networks in C++
Pattern Recognition with Neural Networks in C++

Why do we feel a need to write a book about pattern recognition when many excellent books are already available on this classical topic? The answer lies in the depth of our coverage of neural networks as natural pattern classifiers and clusterers. Artificial neural network computing has emerged as an extremely active research area with a central...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy