Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Getting Started with FortiGate
Getting Started with FortiGate

This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations.

Overview

  • Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of...
iPad All-in-One For Dummies
iPad All-in-One For Dummies

Contains five mini-books that illustrate how to use the iPad for pleasure and work, covering topics such as iWork, e-mail, and business applications as well as recommendations for must-have apps.

Apple turned the computing world on its ear when it introduced the iPad. This small wonder, which weighed less than a pound and a half,...

iPhone For Dummies (Computer/Tech)
iPhone For Dummies (Computer/Tech)
Play podcasts, music, videos, and photo slideshows

Customize your iPhone, fill it with cool stuff, even use it to manage your life

With Apple's iPhone, you have the world virtually in your pocket. But because it does so much, there's much to know about using it! This full-color guide shows you...

Macworld iPhone Superguide, Second Edition
Macworld iPhone Superguide, Second Edition
For iPhone, iPod, iPod touch, Mac and Windows users, this book details and simplifies the best use of your iPhone features. This Second Edition brings back the popular iPhone Superguide, updated for iPhone, iPhone 3G, and iPod touch.

 

Our experts share how to master hidden features easily, connect to nearby...

Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

Marketing For The Home-Based Business
Marketing For The Home-Based Business

This book features an expanded section on using new technologies to increase the reach of marketing efforts, offers sample telephone and voice mail scripts, and includes advice on setting up a home office for maximum efficiency.

The explosive growth of home-based businesses across America and throughout the world is one of the most...

PGP & GPG: Email for the Practical Paranoid
PGP & GPG: Email for the Practical Paranoid
"...The World's first user-friendly book on email privacy...unless you're a cryptographer, or never use email, you should read this book." —Len Sassaman, CodeCon Founder

"Today, most email is sent like a postcard. We all should want to put our mail back into secure envelopes again. PGP and GPG are two of the leading tools...

Alfresco 3 Cookbook
Alfresco 3 Cookbook

Alfresco is the renowned and multiple award-winning open source Enterprise content management system which allows you to build, design, and implement your very own ECM solutions.

You have read a number of tutorials, blogs, and books on Alfresco. Now you're in the real world, trying to use Alfresco, but you're running into...

C: How to Program (6th Edition)
C: How to Program (6th Edition)

Welcome to the C programming language—and to C++, too! This book presents leadingedge computing technologies for students, instructors and software development professionals.

At the heart of the book is the Deitel signature “live-code approach.” Concepts are presented in the context of complete working...

The Hacker Ethic: A Radical Approach to the Philosophy of Business
The Hacker Ethic: A Radical Approach to the Philosophy of Business

You may be a hacker and not even know it. Being a hacker has nothing to do with cyberterrorism, and it doesn’t even necessarily relate to the open-source movement. Being a hacker has more to do with your underlying assumptions about stress, time management, work, and play. It’s about harmonizing the rhythms of your creative work...

Linux System Administration, Second Edition (Craig Hunt Linux Library)
Linux System Administration, Second Edition (Craig Hunt Linux Library)
Authoritative Answers to All Your Linux Questions

You can rely on the fully updated second edition of Linux System Administration for answers to all your questions about installing, configuring, and administering Linux. Written by two Linux experts, this book teaches you, step-by-step, all the standard...

unlimited object storage image
Result Page: 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy