Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers,...

Make: LEGO and Arduino Projects: Projects for extending MINDSTORMS NXT with open-source electronics
Make: LEGO and Arduino Projects: Projects for extending MINDSTORMS NXT with open-source electronics

Make amazing robots and gadgets with two of today’s hottest DIY technologies. With this easy-to-follow guide, you’ll learn how to build devices with Lego Mindstorms NXT 2.0, the Arduino prototyping platform, and some add-on components to bridge the two. Mindstorms alone lets you create incredible gadgets. Bring in Arduino...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

A Statistical Guide for the Ethically Perplexed
A Statistical Guide for the Ethically Perplexed

For disciplines concerned with human well-being, such as medicine, psychology, and law, statistics must be used in accordance with standards for ethical practice. A Statistical Guide for the Ethically Perplexed illustrates the proper use of probabilistic and statistical reasoning in the behavioral, social, and biomedical...

Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
XML in a Nutshell, 2nd Edition
XML in a Nutshell, 2nd Edition
This powerful new edition provides developers with a comprehensive guide to the rapidly evolving XML space. Serious users of XML will find topics on just about everything they need, from fundamental syntax rules, to details of DTD and XML Schema creation, to XSLT transformations, to APIs used for processing XML documents. Simply put, this is...
2500 Keywords to Get You Hired
2500 Keywords to Get You Hired

Make that important first cut with a resume that packs a punch with 2500 Keywords to Get You Hired

What's in a word? When used effectively on your resume, the right words could land you your next job! 2500 Keywords to Get You Hired breaks down the buzz on buzzwords-those powerful little...

Statics and Dynamics Demystified
Statics and Dynamics Demystified

The fast and easy way to learn statics and dynamics

This new title in the popular Demystified series offers practical, easy-to-follow coverage of the difficult statics and dynamics course. Expert author David McMahon follows the standard curriculum, starting with basic mathematical...

Quantum Computing
Quantum Computing

The twentieth century witnessed the birth of revolutionary ideas in the phys- ical sciences. These ideas began to shake the traditional view of the universe dating back to the days of Newton, even to the days of Galileo. Albert Ein- stein is usually identified as the creator of the relativity theory, a theory that is used to model the...

The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
"Although the book is directed toward technology courses...it makes for interesting, thought-provoking reading." - Monitoring Times

As new communications applications are developed and brought to market, it is vital for communications professionals to keep abreast of these issues. Since the
...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Result Page: 60 59 58 57 56 55 54 53 52 51 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy