Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric...
Tracking the Neolithic House in Europe: Sedentism, Architecture and Practice (One World Archaeology)
Tracking the Neolithic House in Europe: Sedentism, Architecture and Practice (One World Archaeology)

The Neolithic period is noted primarily for the change from hunter-gatherer societies to agriculture, domestication and sedentism. This change has been studied in the past by archaeologists observing the movements of plants, animals and people. But has not been examined by looking at the domestic architecture of the time. Along with tracking...

Encyclopedia of World Cultures, Vol. 1: North America
Encyclopedia of World Cultures, Vol. 1: North America
This volume covers the cultures of Canada, Greenland (Kalaallit Nunaat), and the United States of America. Greenland, although administratively linked to Denmark, is included here because its native inhabitants, the Inuit, are related culturally to the Inuit of Canada. For the same reason, the cultures of Hawaii are covered in the Oceania volume,...
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam

Get certified as an Azure architect by acing the 70-535 Architecting Microsoft Solutions (70-535) exam using this comprehensive guide with full coverage of the exam objectives

Key Features

  • Learn to successfully design and architect powerful solutions on the Azure Cloud platform
  • ...
Pro ASP.NET Web API Security: Securing ASP.NET Web API
Pro ASP.NET Web API Security: Securing ASP.NET Web API

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility,
...

Mastering Kubernetes: Large scale container deployment and management
Mastering Kubernetes: Large scale container deployment and management

Master the art of container management utilizing the power of Kubernetes.

About This Book

  • This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
  • Discover new features such as autoscaling, rolling updates, resource quotas,...
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
Material Girls: Why Reality Matters for Feminism
Material Girls: Why Reality Matters for Feminism

'A clear, concise, easy-to-read account of the issues between sex, gender and feminism . . . an important book' Evening Standard

'A call for cool heads at a time of great heat and a vital reminder that revolutions don't always end well' Sunday Times

...

Computer Crime, Investigation, and the Law
Computer Crime, Investigation, and the Law

One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,...

Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Formal Ontology in Information Systems:  Proceedings of the Fourth International Conference (FOIS 2006), Volume 150
Formal Ontology in Information Systems: Proceedings of the Fourth International Conference (FOIS 2006), Volume 150
Since ancient times, ontology, the analysis and categorisation of what exists, has been fundamental to philosophical enquiry. But, until recently, ontology has been seen as an abstract, purely theoretical discipline, far removed from the practical applications of science. However, with the increasing use of sophisticated computerised information...
Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy