Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Security in Computing, Third Edition
Security in Computing, Third Edition

Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.

This sweeping revision of the field's classic guide to computer...

Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
The Home-Based Business Kit
The Home-Based Business Kit
Launch a money-making venture from the comfort of your own home.

Starting a home-based business has special challenges. From preparing the right business plan to your first successful sale, The Home-Based Business Kit gives you the tools you need to succeed and make a profit. Experienced home-based business owners show you how to:
...
Perl Scripting for IT Security
Perl Scripting for IT Security
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Legal Strategies: How Corporations Use Law to Improve Performance
Legal Strategies: How Corporations Use Law to Improve Performance

Far from regarding the law as supreme, corporations approach law as an element of executive thought and action aimed at optimizing competitiveness.

The objective of this book is to identify, explore and define corporate legal strategies that seek advantage in the opportunities revealed when the Law is perceived as a resource to be...

ECG Diagnosis: A Self-Assessment Workbook
ECG Diagnosis: A Self-Assessment Workbook
ECG Diagnosis: A Self-Assessment Workbook provides an educational self-assessment guideline for the interpretation of various electrocardiographic abnormalities. In this book, 250 common and clinically pertinent ECG abnormalities are included. Thus, any ECG tracings showing extremely unusual and rare ECG abnormalities or complex...
The Success of Open Source
The Success of Open Source

Much of the innovative programming that powers the Internet, creates operating systems, and produces software is the result of "open source" code, that is, code that is freely distributed--as opposed to being kept secret--by those who write it. Leaving source code open has generated some of the most sophisticated developments in...

QUANTUM COMPUTING WITH PYTHON: The new comprehensive guide to master applied artificial intelligence in Physics. Learn Machine Learning and computer programming with a complete crash course
QUANTUM COMPUTING WITH PYTHON: The new comprehensive guide to master applied artificial intelligence in Physics. Learn Machine Learning and computer programming with a complete crash course

*KINDLE VERSION Discounted at $ 9.99 instead of $ 14.99... Get QUANTUM PHYSICS section for FREE!!

"Master the best methods for PYTHON. Learn how to programming as a pro and get positive ROI in 7 days with data science and machine learning" 

Are you looking...

Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Few topics in the information technology (IT) field today generate as much interest as
security. Interestingly, the IT world has been struggling with security issues for over 30
years, yet many security problems remain unsolved, unaddressed, and serious. As
those responsible for securing systems and networks address security issues
...
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

unlimited object storage image
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy