Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Black Hat: Misfits, Criminals, and Scammers in the Internet Age
Black Hat: Misfits, Criminals, and Scammers in the Internet Age

Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, John Biggs, this book is an ideal read...

A Grammatical View of Logic Programming (Logic Programming)
A Grammatical View of Logic Programming (Logic Programming)

Within the field of logic programming there have been numerous attempts to transform grammars into logic programs. This book describes a complementary approach that views logic programs as grammars and shows how this new presentation of the foundations of logic programming, based on the notion of proof trees, can enrich the field.
...

Molecular Imaging: An Essential Tool in Preclinical Research, Diagnostic Imaging, and Therapy (Ernst Schering Foundation Symposium Proceedings)
Molecular Imaging: An Essential Tool in Preclinical Research, Diagnostic Imaging, and Therapy (Ernst Schering Foundation Symposium Proceedings)
"Molecular imaging" has been previously defined as "the in vivo characterization and measurement of biologic processes at the cellu lar and molecular level." This broad definition emerged during the last few years as a consequence of the convergence of molecular and cell biology with imaging science, including...
Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)
Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)
In just 24 lessons of one hour or less, you will uncover the inner workings of TCP/IP. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of TCP/IP from the ground up.

 

Practical discussions provide...

Improving Energy Efficiency in Industrial Energy Systems: An Interdisciplinary Perspective on Barriers, Energy Audits, Energy Management, Policies, and Programs (Green Energy and Technology)
Improving Energy Efficiency in Industrial Energy Systems: An Interdisciplinary Perspective on Barriers, Energy Audits, Energy Management, Policies, and Programs (Green Energy and Technology)

Industrial energy efficiency is one of the most important means of reducing the threat of increased global warming. Research however states that despite the existence of numerous technical energy efficiency measures, its deployment is hindered by the existence of various barriers to energy efficiency. The complexity of increasing energy...

Hacking Exposed: Network Security Secrets & Solutions, Third Edition
Hacking Exposed: Network Security Secrets & Solutions, Third Edition

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."...

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Using iTunes 10
Using iTunes 10

For 10 years, iTunes has brought listening pleasure to people’s computers. Originally introduced in January 2001, the first version of iTunes worked only with Mac OS 9 operating systems, but later that year, Apple added support for OS X and for iPods—and that’s when iTunes really took off. Subsequent versions of the...

Learning OpenVPN 2.0.9
Learning OpenVPN 2.0.9

OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi, and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPsec VPN implementations. It uses the secure and stable TLS/SSL...

Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

**Covers Nagios 2.0**

"WOW! This books is incredibly detailed and Wolfgang has done an excellent job. I don't think I could have gone into that much detail if I wrote a book mysel. Kudos!" —Ethan Galstad, Nagios main developer

Good system administrators know about problems long before anyone asks,...

Creating Games in C++ : A Step-by-Step Guide
Creating Games in C++ : A Step-by-Step Guide
Do you love video games? Ever wondered if you could create one of your own, with all the bells and whistles? It's not as complicated as you'd think, and you don't need to be a math whiz or a programming genius to do it. In fact, everything you need to create your first game, "Invasion of the Slugwroths," is included in this book and...
Making Scorecards Actionable: Balancing Strategy and Control
Making Scorecards Actionable: Balancing Strategy and Control
"The attraction of balanced scorecards is to help translate strategy into the stories, business logic and tasks that grab people's imaginations and so result in purposeful action. Yet, too often, it hasn't worked that way. In a refreshingly honest and pragmatic way, the authors analyse both the successes and failures of companies using...
unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy