Home | Amazing | Today | Tags | Publishers | Years | Search 
Business Intelligence with MicroStrategy Cookbook
Business Intelligence with MicroStrategy Cookbook

Over 90 practical, hands-on recipes to help you build your MicroStrategy business intelligence project, including more than a 100 screencasts

Overview

  • Learn about every step of the BI project, starting from the installation of a sample database
  • Design web reports and documents
  • ...
Security+ Guide to Network Security Fundamentals
Security+ Guide to Network Security Fundamentals

Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly preparing readers for the CompTIA Security+ SY0-301 certification exam. Its comprehensive introduction to practical network and computer...

Transition to Renewable Energy Systems
Transition to Renewable Energy Systems

In the wake of global climate change and increasing geopolitical instability of oil supply an accelerated transition to renewable energy system gets increasingly important, if not unavoidable.

This book encompasses reports of select energy strategies as well as in-depth technical information of the already or potentially involved...

Urban Aerodynamics: Wind Engineering for Urban Planners and Designers
Urban Aerodynamics: Wind Engineering for Urban Planners and Designers

Prepared by the Task Committee on Urban Aerodynamics of the Environmental Wind Engineering Committee of the Technical Council on Wind Engineering of ASCE. Urban Aerodynamics: Wind Engineering for Urban Planners and Designers introduces the basic tools and technology used by engineers to determine the effects of wind on city streets and...

Biophotonics: Optical Science and Engineering for the 21st Century
Biophotonics: Optical Science and Engineering for the 21st Century

It is now well established that all living systems emit a weak but permanent photon flux in the visible and ultraviolet range. This biophoton emission is correlated with many, if not all, biological and physiological functions. There are indications of a hitherto-overlooked information channel within the living system. Biophotons may trigger...

SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices....

The Science of Solar System Ices (Astrophysics and Space Science Library)
The Science of Solar System Ices (Astrophysics and Space Science Library)

The role of laboratory research and simulations in advancing our understanding of solar system ices (including satellites, KBOs, comets, and giant planets) is becoming increasingly important. Understanding ice surface radiation processing, particle and radiation penetration depths, surface and subsurface chemistry, morphology, phases,...

Mastering Nmap Scripting Engine
Mastering Nmap Scripting Engine

Master the Nmap Scripting Engine and the art of developing NSE scripts

About This Book

  • Extend the capabilities of Nmap to perform custom tasks with the Nmap Scripting Engine
  • Learn the fundamentals of Lua programming
  • Develop powerful scripts for the Nmap Scripting...
Managing Information Security, Second Edition
Managing Information Security, Second Edition

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers...

Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy