Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ethical Hacking
Ethical Hacking
By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50...
Business Continuity and Disaster Recovery Planning for IT Professionals, Second Edition
Business Continuity and Disaster Recovery Planning for IT Professionals, Second Edition

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. The...

Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)
Implementing Cisco IOS Network Security (IINS): (CCNA Security exam 640-553) (Authorized Self-Study Guide)

Authorized Self-Study Guide

Implementing Cisco IOS Network Security (IINS)

 

Foundation learning for CCNA Security IINS 640-553 exam

 

...

What It Takes To Be Number #1: Vince Lombardi on Leadership
What It Takes To Be Number #1: Vince Lombardi on Leadership

Leadership continues to be one of the most written-about and most trained-for qualities in business today. And no figure so fully embodies the leadership qualities managers hope to cultivate in their professional and personal lives as the late Vince Lombardi, the greatest NFL coach of all time.

The exalted place Lombardi holds in...

E-Habits: What You Must Do to Optimize Your Professional Digital Presence
E-Habits: What You Must Do to Optimize Your Professional Digital Presence

What Does the Digital You Look Like?

What you read • Where you shop • How you communicate with coworkers, friends, and strangers • Whom you interact with on social networking sites . . . these are just a few of the things that make up the Digital You.

"The Digital You is a complex mosaic of...

Object-Oriented Design Heuristics
Object-Oriented Design Heuristics
Upon completion of an object-oriented design, you are faced with a troubling question: "Is it good, bad, or somewhere in between?" Seasoned experts often answer this question by subjecting the design to a subconscious list of guidelines based on their years of experience. Experienced developer Arthur J. Riel has captured this elusive,...
Computer and Intrusion Forensics (Artech House Computer Security Series)
Computer and Intrusion Forensics (Artech House Computer Security Series)
Computer forensics and intrusion forensics are rapidly becoming
mainstream activities in an increasingly online society due to the
ubiquity of computers and computer networks. We make daily use of
computers either for communication or for personal or work transactions.
From our desktops and laptops we access Web servers, e-mail
...
Reliability, Maintainability and Risk: Practical Methods for Engineers
Reliability, Maintainability and Risk: Practical Methods for Engineers
'The latest edition of this practical introduction to the basics of reliabilty, maintainability and safety introduces new sections on the accuracy of reliability prediction methods, common cause failures in systems, and expands and updates the descriptions of recent safety standards, in particular ISO 61508 and the use of 'Safety Integrity Levels'...
The Essential Guide to Flex 3
The Essential Guide to Flex 3
Flex 3 is the next generation of a technology that revolutionized web applications. It is the next evolutionary step of Flash, which has grown from a web animation medium to a powerful enterprise web design and development platform. With nearly 98% of all web browsers, and a growing number of mobile devices, running Flash Player, a knowledge of...
Smart Card Applications: Design models for using and programming smart cards
Smart Card Applications: Design models for using and programming smart cards

A practical guide to the specification, design, and programming of smart card systems for working applications.

More than 1 billion smartcards are produced every year. Generally defined as any pocket-sized card with embedded integrated circuits or chips, they have a huge number of applications including travel...

Effective Databases for Text & Document Management
Effective Databases for Text & Document Management
The focus of this book is effective databases for text and document management inclusive of new and enhanced techniques, methods, theories and practices. The research contained in these chapters is of particular significance to researchers and practitioners alike because of the rapid pace at which the Internet and related technologies are changing...
Web Services Security
Web Services Security

Minimize security risks in your system by successfully rolling out secure Web Services with help from this exceptional guide. Web Services Security covers everything network security professionals need to know, including details on Web Services architecture, SOAP, UDDI, WSDL, XML Signature, XML Encryption, SAML, XACML, XKMS, and...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy