Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Essential Family Guide to Caring for Older People
The Essential Family Guide to Caring for Older People

No one wants to think about getting older. It's true. At any age, when things are moving along normally day to day and everyone seems fit and well, there seems no reason to think about future problems that your friends and relatives might (and probably will) come across as they age. In fact, it might even seem a little morbid to...

Uber Brave New Service or Unfair Competition: Legal Analysis of the Nature of Uber Services (Ius Gentium: Comparative Perspectives on Law and Justice)
Uber Brave New Service or Unfair Competition: Legal Analysis of the Nature of Uber Services (Ius Gentium: Comparative Perspectives on Law and Justice)

This book analyzes the legal issues connected with the provision of Uber-related services. It primarily focuses on the various contractual and non-contractual relationships that occur during the use of Uber applications, especially with reference to Uber headquarters (Uber App), Uber branch offices (advertisements), Uber partner...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business

  • Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
  • Covers 'What to...
Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...

Semantic Web Technologies: Trends and Research in Ontology-based Systems
Semantic Web Technologies: Trends and Research in Ontology-based Systems
The Semantic Web combines the descriptive languages RDF (Resource Description Framework) and OWL (Web Ontology Language), with the data-centric, customizable XML (eXtensible Mark-up Language) to provide descriptions of the content of Web documents. These machine-interpretable descriptions allow more intelligent software systems to be written,...
JavaScript(TM) Phrasebook
JavaScript(TM) Phrasebook
Developers are hungry for a concise, easy-to-use reference that puts essential code "phrases" at their fingertips. JavaScript, and the related AJAX, is hot and there is little to no information on how to use JavaScript to develop AJAX-based applications. While there are many JavaScript books on the market, most of them are dated and few...
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

The only official study guide for the new CCSP exam

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter...

Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
The Official CHFI Study Guide (Exam 312-49)
The Official CHFI Study Guide (Exam 312-49)
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an...
Result Page: 50 49 48 47 46 45 44 43 42 41 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy