Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Python High Performance Programming
Python High Performance Programming

If you have at least a basic knowledge of Python, this book will help you maximize the performance of your code and applications. Easy to follow tutorials will make you a hard act to follow in Python programming.

Overview

  • Identify the bottlenecks in your applications and solve them using the best...
LinkedIn For Dummies, 4th Edition
LinkedIn For Dummies, 4th Edition

Build your network, find a job, and been seen as a thought leader

LinkedIn is your number-one personal branding tool, and this friendly guide shows you how to harness it to build connections and relationships—and stand out in the world's largest professional network. LinkedIn For Dummies walks you step by...

Microarrays in Clinical Diagnostics (Methods in Molecular Medicine)
Microarrays in Clinical Diagnostics (Methods in Molecular Medicine)
Within the last decade, microarray technology has evolved from an emerging technology developed and used by a few laboratories into a well-established technology used in laboratories all over the world. In fact, the need to characterize genetic alterations is one of the highest priorities for the future of medicine and the...
Hedge Fund Modeling and Analysis Using Excel and VBA (The Wiley Finance Series)
Hedge Fund Modeling and Analysis Using Excel and VBA (The Wiley Finance Series)

Co-authored by two respected authorities on hedge funds and asset management, this implementation-oriented guide shows you how to employ a range of the most commonly used analysis tools and techniques both in industry and academia, for understanding, identifying and managing risk as well as for quantifying return factors across several key...

Forensic Science
Forensic Science

This is a comprehensive reference source on the theory, techniques, and application of the various forensic sciences.The past decade has seen an explosion of interest in the application of scientific techniques to investigations of crime. Television audiences have developed a seemingly insatiable appetite for shows such as CSI: Crime Scene...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Industrial Control Systems: Advances and Applications, First Edition
Industrial Control Systems: Advances and Applications, First Edition
'It is a compilation of the best instrumentation and control techniques used in industry, providing interesting theoretical content as well as practical topics on planning, integration, and application.'
--Plant Engineering, 2003

This is a comprehensive, practical, easy-to-read book on process control, covering some of
...
Cisco Access Control Security : AAA Administration Services
Cisco Access Control Security : AAA Administration Services

This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.


Hands-on techniques for enabling authentication, authorization, and
...

Mars, A Cosmic Stepping Stone: Uncovering Humanity's Cosmic Context
Mars, A Cosmic Stepping Stone: Uncovering Humanity's Cosmic Context
The questions of our origin and cosmic abundance of life are among the most compelling facing humanity. We have determined much about the nature and origin of the Universe and our place in it, but with virtually all evidence of our origin long since gone from our world and an unimaginably vast Universe still to explore, defining answers are...
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
The user's guide to best practices in improving and enhancing security in a SAP landscape.

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and
...
Professional Java, JDK 5 Edition
Professional Java, JDK 5 Edition
Java continues to be the dominant language for building server applications, and the latest update to the Java platform—JDK 5—boasts many new features, including a metadata facility, generics, autoboxing, and improved user interface performance. Building upon Ivor Horton's Beginning Java, this book provides insight into these...
Result Page: 29 28 27 26 25 24 23 22 21 20 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy