Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Digital Photography Bible (Desktop Edition)
Digital Photography Bible (Desktop Edition)
If a digital camera can do it, you can do it, too...

Good photography is more art than science. You need to know not only the hardware and software, but also how to compose a photo, edit and improve the images you get, and take pictures that achieve your objectives. From choosing a digital camera to taking shots that tell a...

Digital Character Animation 2, Volume II: Advanced Techniques (Digital Character Animation)
Digital Character Animation 2, Volume II: Advanced Techniques (Digital Character Animation)
At last, George Maestri’s advanced-techniques volume of his groundbreaking [digital] Character Animation book. Completely new: No updated material from the first volume (covering Essential Techniques) or from the first edition (published in 1996 and now out of print). If you are into 3D animation at all—learning, practicing (or managing...
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it...

Nanocomputers and Swarm Intelligence
Nanocomputers and Swarm Intelligence

“We need men who can dream of things that never were.” It is this sentence spoken by John Fitzgerald Kennedy in 1963 which has undoubtedly influenced my industrial career. Whether it be everyday electronics for the general public, or the components industry or even the world of video and imagery, the technological innovations which...

Silverlight Recipes: A Problem-Solution Approach, Second Edition
Silverlight Recipes: A Problem-Solution Approach, Second Edition

Silverlight Recipes: A Problem-Solution Approach, Second Edition is your practical companion to developing rich, interactive web applications with Microsoft’s latest technology. This book tackles common problems and scenarios that on-the-job developers face every day by revealing code and detailed solutions. You’ll...

Mastering SaltStack
Mastering SaltStack

Take charge of SaltStack to automate and configure enterprise-grade environments

About This Book

  • Automate tasks effectively, so that your infrastructure can run itself
  • Take advantage of cloud-based services that can expand the capabilities of your own data centers
  • Tackle...
The Bully at Work: What You Can Do to Stop the Hurt and Reclaim Your Dignity on the Job
The Bully at Work: What You Can Do to Stop the Hurt and Reclaim Your Dignity on the Job

A landmark book that blazed light on one of the business world's dirtiest secrets, The Bully at Work exposed the destructive, silent epidemic of workplace bullying that devastates the lives, careers, and families of millions. In this completely updated new edition based on an updated survey of workplace issues, the authors explore...

Pro VB 2005 and the .NET 2.0 Platform, Second Edition
Pro VB 2005 and the .NET 2.0 Platform, Second Edition
The initial release of the .NET platform (circa 2001) caused quite a stir within the Visual Basic programming community. One the one hand, many die-hard VB 6.0 developers were up in arms at the major differences between VB 6.0 and Visual Basic .NET. Individuals in this group were a bit stunned to see that VB .NET was not in fact “VB...
New Directions in Human Information Behavior (Information Science and Knowledge Management)
New Directions in Human Information Behavior (Information Science and Knowledge Management)
From the reviews:

"Human information Behaviour (HIB) is one of the most popular and yet most complex research areas in the field of library and information science (LIS). … This book is a valuable addition to the other books recently published in this area … . the editors have done a good job organising them in a logical way...

CISA Certified Information Systems Auditor All-in-One Exam Guide
CISA Certified Information Systems Auditor All-in-One Exam Guide

"All-in-One is All You Need."

CISA Certified Information Systems Auditor All in One Exam Guide

Get complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit expert, this...

MOS 2010 Study Guide for Microsoft Word, Excel, PowerPoint, and Outlook
MOS 2010 Study Guide for Microsoft Word, Excel, PowerPoint, and Outlook

Desktop computing proficiency is increasingly important in today’s business world. As a result, when screening, hiring, and training employees, employers can feel reassured by relying on the objectivity and consistency of technology certification to ensure the competence of their workforce. As an employee or job seeker, you can...

unlimited object storage image
Result Page: 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy