Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Queueing Theory with Applications to Packet Telecommunication
Queueing Theory with Applications to Packet Telecommunication
Soon after Samuel Morse’s telegraphing device led to a deployed electrical
telecommunications system in 1843, waiting lines began to form by those
wanting to use the system. At this writing queueing is still a significant factor in
designing and operating communications services, whether they are provided
over the Internet
...
Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

Multimedia Data Mining and Knowledge Discovery
Multimedia Data Mining and Knowledge Discovery
Multimedia information is ubiquitous and essential in many applications, and repositories of multimedia are numerous and extremely large. Consequently, researchers and professionals need new techniques and tools for extracting the hidden, useful knowledge embedded within multimedia collections, thereby helping them discover relationships between...
Silverlight 2 Recipes: A Problem-Solution Approach (Expert's Voice in .Net)
Silverlight 2 Recipes: A Problem-Solution Approach (Expert's Voice in .Net)
Microsoft .NET Architect Evangelist, Jit Ghosh, presents a practical companion guide to developing rich, interactive web applications with Silverlight 2. Common problems, issues, and every–day scenarios are tackled with a detailed discussion of the solution and ready–made code recipes that will save you hours of coding...
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Sketchbook Pro Digital Painting Essentials
Sketchbook Pro Digital Painting Essentials

Create stunning professional grade artwork using Sketchbook Pro

Overview

  • Discover tricks and techniques that will help you make the most out of Sketchbook Pro
  • Packed with practical examples that help you create expressive sketches ranging from cartoons to portraits
  • A...
Never Bet the Farm: How Entrepreneurs Take Risks, Make Decisionsand How You Can, Too
Never Bet the Farm: How Entrepreneurs Take Risks, Make Decisionsand How You Can, Too
In Never Bet the Farm two leading entrepreneurs, Anthony Iaquinto and Stephen Spinelli, turn much of the so-called expert advice for entrepreneurs on its head. They show that by preparing for setbacks and using a framework that can help reduce risks and simplify decision making, entrepreneurs can increase their probability for success....
The Neural Simulation Language: A System for Brain Modeling
The Neural Simulation Language: A System for Brain Modeling
The Neural Simulation Language (NSL), developed by Alfredo Weitzenfeld, Michael Arbib, and Amanda Alexander, provides a simulation environment for modular brain modeling. NSL is an object-oriented language offering object-oriented protocols applicable to all levels of neural simulation. One of NSL's main strengths is that it allows for realistic...
The Photoshop Darkroom 2: Creative Digital Transformations
The Photoshop Darkroom 2: Creative Digital Transformations

Back in the old days, working in a chemical darkroom, I could only have dreamed of a postprocessing tool as wonderful as Photoshop. But for me that’s exactly what Photoshop is—a tool. It’s a tool that helps me as a professional image creator. The image is what matters, not the tool.

The Photoshop...

Absolute C++ (5th Edition)
Absolute C++ (5th Edition)

 

This book is designed to be a textbook and reference for programming in the C++ language. Although it does include programming techniques, it is organized around the features of the C++ language, rather than any particular curriculum of techniques. The main audience I had in mind is undergraduate students...

unlimited object storage image
Result Page: 98 97 96 95 94 93 92 91 90 89 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy