Home | Amazing | Today | Tags | Publishers | Years | Search 
Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

Data Visualization For Dummies
Data Visualization For Dummies

A straightforward, full-color guide to showcasing data soyour audience can see what you mean, not just read about it

Big data is big news! Every company, industry, not-for-profit,and government agency wants and needs to analyze and leveragedatasets that can quickly become ponderously large. Datavisualization software enables...

Information Technology Project Management (with Microsoft Project 2010 60 Day Trial CD-ROM)
Information Technology Project Management (with Microsoft Project 2010 60 Day Trial CD-ROM)

Discover exciting "behind-the-scenes" opportunities and challenges in technology today with Schwalbe's unique INFORMATION TECHNOLOGY PROJECT MANAGEMENT, 7E. This one-of-a-kind book demonstrates the principles distinctive to managing information technology (IT) projects that extend well beyond standard project management...

Multimedia Information Extraction: Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring
Multimedia Information Extraction: Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring

The advent of increasingly large consumer collections of audio(e.g., iTunes), imagery (e.g., Flickr), and video (e.g., YouTube)is driving a need not only for multimedia retrieval but alsoinformation extraction from and across media. Furthermore,industrial and government collections fuel requirements for stockmedia access, media preservation,...

Business Ethics: An Ethical Decision-Making Approach (Foundations of Business Ethics)
Business Ethics: An Ethical Decision-Making Approach (Foundations of Business Ethics)

Business Ethics: An Ethical Decision-Making Approach presents a practical decision-making framework to aid in the identification, understanding, and resolution of complex ethical dilemmas in the workplace.

  • Focuses exclusively on three basic aspects of ethical decision making and behavior—how it actually takes...
Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning
Applied Text Analysis with Python: Enabling Language-Aware Data Products with Machine Learning

From news and speeches to informal chatter on social media, natural language is one of the richest and most underutilized sources of data. Not only does it come in a constant stream, always changing and adapting in context; it also contains information that is not conveyed by traditional data sources. The key to unlocking natural...

Build Your Own Website The Right Way Using HTML & CSS: Start Building Websites Like a Pro!
Build Your Own Website The Right Way Using HTML & CSS: Start Building Websites Like a Pro!

With over 60,000 copies sold since its first edition, this SitePoint best-seller has just had a fresh update to include recent advances in the web industry.

With the first two editions coming highly recommended by established, leading web designers and developers, the third edition with all its extra goodies will...

CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (MindTap Course List)
CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (MindTap Course List)

This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompTIA Security+ SY0-401 Certification Exam, providing thorough coverage of all domain objectives to help readers prepare for professional...

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

iPad All-in-One For Dummies
iPad All-in-One For Dummies

Your favorite, full-color anthology on all things iPad; now completely updated!

The iPad's popularity just keeps growing. Part iPod, game console, e-reader, and ultra-powerful microcomputer; the iPad does so many things that this resource needs five minibooks to address them all. Written by bestselling For Dummies...

T-Cell Autoimmunity and Multiple Sclerosis (Neuroscience Intelligence Unit 5)
T-Cell Autoimmunity and Multiple Sclerosis (Neuroscience Intelligence Unit 5)

Reports on the latest advances in the field, for new and experienced scientists. Coverage includes the role of T-cells in multiple sclerosis (MS), T-cell autoimmunity and EAE in nonhuman primates, MBP-reactive T-cells in MS, and genetic engineering of brain-specific T-cells for treatment of diseases in the central nervous system. Also...

Windows 10 Absolute Beginner's Guide (includes Content Update Program)
Windows 10 Absolute Beginner's Guide (includes Content Update Program)

Book + Content Update Program

 

Make the most of your new Windows 10 device–without needing to be a technical expert! This book is the fastest way to take control of Windows 10, and use it to create, connect, and...

Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy