Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
Serial Port Complete: COM Ports, USB Virtual COM Ports, and Ports for Embedded Systems (Complete Guides series)
Serial Port Complete: COM Ports, USB Virtual COM Ports, and Ports for Embedded Systems (Complete Guides series)
When I wrote the first edition of this book, the RS-232 serial port was the workhorse of PC interfaces. Modems and scores of other peripherals connected to PCs via the serial ports that were present on every machine.

When the Universal Serial Bus (USB) took hold in the late 1990s, many predicted that serial ports would soon be obsolete.
...
Practical Industrial Data Networks: Design, Installation and Troubleshooting (IDC Technology)
Practical Industrial Data Networks: Design, Installation and Troubleshooting (IDC Technology)
This is a comprehensive book covering the essentials of troubleshooting and problem solving of
industrial data communications systems including areas such as RS-232, RS-485, industrial protocols
such as Modbus, fiber optics, industrial Ethernet, TCP/IP, DeviceNet and Fieldbus protocols such as
Profibus and Foundation Fieldbus. It can
...
GNS3 Network Simulation Guide
GNS3 Network Simulation Guide

Acquire a comprehensive knowledge of the GNS3 graphical network simulator, using it to prototype your network without the need for physical routers

Overview

  • Develop your knowledge for Cisco certification (CCNA, CCNP, CCIE), using GNS3
  • Install GNS3 successfully on Windows, Linux, or OS...
Java 9 Modularity Revealed: Project Jigsaw and Scalable Java Applications
Java 9 Modularity Revealed: Project Jigsaw and Scalable Java Applications

Develop modular applications using the Java Platform Module System, the single most anticipated feature in Java 9. You will improve maintainability and performance of your Java applications by deploying only modules that are needed and encapsulating their implementation details. 


Until now Java has been monolithic.
...
Meet the Kinect: An Introduction to Programming Natural User Interfaces (Technology in Action)
Meet the Kinect: An Introduction to Programming Natural User Interfaces (Technology in Action)

In this chapter you’ll unbox a new Kinect—or if you have one already, you’ll disconnect it from your Xbox. Then you’ll install some software, plug the Kinect into a computer, and take a look at what all of the fuss is about with this unique device. You’ll learn what the different components of the Kinect are and...

Building Apps for the Universal Windows Platform: Explore Windows 10 Native, IoT, HoloLens, and Xamarin
Building Apps for the Universal Windows Platform: Explore Windows 10 Native, IoT, HoloLens, and Xamarin

Develop Windows 10 applications faster and more efficiently using the Universal Windows Platform. You will use Xamarin to create apps for macOS, iOS, and Android devices.

Building Apps for the Universal Windows Platform is a complete guide covering PCs, tablets, phones, and other devices such as HoloLens. You...

Mobile Database Systems (Wiley Series on Parallel and Distributed Computing)
Mobile Database Systems (Wiley Series on Parallel and Distributed Computing)
A breakthrough sourcebook to the challenges and solutions for mobile database systems

This text enables readers to effectively manage mobile database systems (MDS) and data dissemination via wireless channels. The author explores the mobile communication platform and analyzes its use in the development of a distributed database management...

Home Networking Demystified
Home Networking Demystified
No need to be intimidated by home networking! With a very readable and easy to understand writing style, this book takes the anxiety out of learning how to build or expand a home network. Read a home networking book organised like a fun and painless self-teaching guide. Use the 8-page, 2-colour visual instruction insert to see how to set up a home...
Windows Virus and Malware Troubleshooting (Windows Troubleshooting)
Windows Virus and Malware Troubleshooting (Windows Troubleshooting)

Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.

Whatever version of Windows you’re using, the threat of virus and malware infection is always a common danger. From key...

Blockchain: Blueprint for a New Economy
Blockchain: Blueprint for a New Economy

Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to become the fifth...

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy