Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SSL & TLS Essentials: Securing the Web
SSL & TLS Essentials: Securing the Web
The Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now—for the first time the details of these critical security...
Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Calculus: A Complete Course
Calculus: A Complete Course

Adams Calculus is intended for the three semester calculus course. Classroom proven in North America and abroad, this classic text has been praised for its high level of mathematical integrity including complete and precise statements of theorems, use of geometric reasoning in applied problems, and the diverse range of applications across the...

Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

The present book 1 provides a rigorous treatment and coherent presentation of the consolidated results of the authors' work, over the past four years, on the employment of logic programming as a representational and reasoning tool. It comes out of a background of a world-wide research effort for at least the past six years on the...

Oracle Application Express Administration: For DBAs and Developers
Oracle Application Express Administration: For DBAs and Developers

Succeed in managing Oracle Application Express (APEX) environments. This book focuses on creating the right combination of scalability, high-availability, backup and recovery, integrity, and resource control. The book covers everything from simple to enterprise-class deployments, with emphasis on enterprise-level requirements and coverage of...

Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
This book focuses on the application of ionic liquids in flow assurance in the oil and gas industry. It discusses their physiochemical properties, and considers the role of ionic liquids as gas hydrate inhibitors in offshore pipelines.

Gas hydrate occurrence can pose a major threat to pipeline integrity. Therefore, different...

T-SQL Fundamentals (3rd Edition)
T-SQL Fundamentals (3rd Edition)

Effectively query and modify data using Transact-SQL
Master T-SQL fundamentals and write robust code for Microsoft SQL Server and Azure SQL Database. Itzik Ben-Gan explains key T-SQL concepts and helps you apply your knowledge with hands-on exercises. The book first introduces
...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

C in Depth
C in Depth
In the third edition of the book C in depth , the authors explain the basics of the programming language while maintaining the integrity and clarity of the programs. The book can be utilized by both beginners and advanced level programmers as a self-evaluation and learning source. There are more than 310 programs with explanations to illustrate...
Ageing and Life Extension of Offshore Structures: The Challenge of Managing Structural Integrity
Ageing and Life Extension of Offshore Structures: The Challenge of Managing Structural Integrity
A comprehensive overview of managing and assessing safety and functionality of ageing offshore structures and pipelines
A significant proportion, estimated at over 50%, of the worldwide infrastructure of offshore structures is in a life extension phase and is vulnerable to ageing processes. This book captures the central
...
Photo Retouching with Photoshop: A Designer's Notebook
Photo Retouching with Photoshop: A Designer's Notebook
Photo Retouching with Photoshop: A Designer's Notebook is at once eye candy, artistic inspiration, and incomparable technical guidance for intermediate-to-advanced digital imaging professionals, graphic artists, photographers, and just about anyone involved in creating digital images or animations. A visual splendor, this full-color book...
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy