Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Contemporary Environmental Issues and Challenges in Era of Climate Change
Contemporary Environmental Issues and Challenges in Era of Climate Change

Over the last few decades, unprecedented global population growth has led to increased demand for food and shelter. At the same time, extraction of natural resources beyond the Earth’s resilience capacity has had a devastating effect on ecosystems and environmental health. Furthermore, climate change is having a significant...

Modern Information Retrieval
Modern Information Retrieval

We live in the information age, where swift access to relevant information in whatever form or medium can dictate the success or failure of businesses or individuals. The timely provision of relevant information with minimal ‘noise' is critical to modern society and this is what information retrieval (IR) is all about. It is a dynamic...

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

...

Fraud Exposed: What You Don't Know Could Cost Your Company Millions
Fraud Exposed: What You Don't Know Could Cost Your Company Millions
The $600 billion gorilla in the room

"Dr. Joe Koletar has provided an effective road map to the problem of occupational fraud, in both the public and private sectors, in America. Such frauds affect every American worker, shareholder, and taxpayer. His insights and ideas are an important contribution to the effort to fight this growing...

Mike Meyers' A+ Guide to Managing and Troubleshooting PCs Lab Manual, Second Edition
Mike Meyers' A+ Guide to Managing and Troubleshooting PCs Lab Manual, Second Edition
Practice the IT Skills Essential for Your Success

  • 60+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results...
Hacking For Dummies
Hacking For Dummies

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!

It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that...

The Handbook of Professionally Managed Assets: A Definitive Guide to Profiting from Alternative Investments
The Handbook of Professionally Managed Assets: A Definitive Guide to Profiting from Alternative Investments

This practical guide provides a comprehensive overview of professionally managed assets, or investments in which all portfolio decisions and rebalancing are delegated to a fund manager or third-party advice service. Savvy investors looking to achieve a better understanding of the nuances, benefits, and drawbacks of using these...

Microsoft SQL Server 2012 Analysis Services: The BISM Tabular Model
Microsoft SQL Server 2012 Analysis Services: The BISM Tabular Model

When we, the authors of this book, first learned what Microsoft’s plans were for Analysis Services in the SQL Server 2012 release, we were not happy. Analysis Services hadn’t acquired much in the way of new features since 2005, even though in the meantime it had grown to become the biggest-selling OLAP tool. It seemed as...

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Computer Crime: A Crimefighter's Handbook (Computer Security)
Computer Crime: A Crimefighter's Handbook (Computer Security)

Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up...

Constructing Measures: An Item Response Modeling Approach
Constructing Measures: An Item Response Modeling Approach
Constructing Measures introduces a way to understand the advantages and disadvantages of measurement instruments, how to use such instruments, and how to apply these methods to develop new instruments or adapt old ones. The book is organized around the steps taken while constructing an instrument. It opens with a summary of the...
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy