Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Electric Power Substations Engineering, Second Edition (The Electric Power Engineering)
Electric Power Substations Engineering, Second Edition (The Electric Power Engineering)
…this book provides a good overview of the many areas that need to be planned for in the construction of a new substation. … [The] chapters give a good description, along with many photographs and schematics … This would be an excellent book for substation engineers, substation project planners and as a supplemental book for...
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys...

CWAP - Certified Wireless Analysis Professional Official Study Guide (Exam PW0-205)
CWAP - Certified Wireless Analysis Professional Official Study Guide (Exam PW0-205)

The only official study guide from the creators of the CWAP exam

  • 100% Complete Coverage – All official test objectives for exam PWO-205 are covered in detail
  • Detailed Frame Analysis – Frame format and frame exchange process diagrams and explanations offer a one-of-a-kind learning experience focused on...
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access
Your step-by-step guide to creating authentication processes that assure compliance

To comply with Sarbanes-Oxley Section 404, you must design an information technology infrastructure that can protect the privacy and access integrity of your data, particularly online, while not restricting business activity. This book shows you how to do that,...

Hazardous Chemicals Handbook, Second Edition
Hazardous Chemicals Handbook, Second Edition
"Every health and safety practitioner should have a copy of this handbook as it is not simply of value to those working in the chemical and related industries, it is also of value to those studying for advanced health and safety qualifications."

Safety & Health Practitioner

The authors' aim with this handbook, is
...
Microsoft Exchange Server 2003 Advanced Administration
Microsoft Exchange Server 2003 Advanced Administration
Advanced Exchange instruction for experienced systems administrators

Building on the success of Jim McBee's Microsoft Exchange Server 2003 24seven, this book is fully updated for Microsoft Exchange Server 2003 SP2 and Windows Server 2003 R2 and now joins the new Sybex series

...
Poverty in Guatemala
Poverty in Guatemala
Poverty in Guatemala is part of the World Bank Country Study series. These reports are published with the approval of the subject government to communicate the results of the Bank's work on the economic and related conditions of member countries to governments and to the development community. This report is part of a collaborative multi-year...
Hacker Linux Uncovered
Hacker Linux Uncovered
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log...
End User Computing Challenges and Technologies: Emerging Tools and Applications (Premier Reference Source)
End User Computing Challenges and Technologies: Emerging Tools and Applications (Premier Reference Source)
Advances in information technologies have allowed end users to become a fundamental element in the development and application of computing technology and digital information.

End User Computing Challenges & Technologies: Emerging Tools & Applications examines practical research and case studies on such benchmark topics...

Protect Your Information With Intrusion Detection (Power)
Protect Your Information With Intrusion Detection (Power)

Protect Your Information with Intrusion Detection contains a detailed overview of the new technology in information protection--intrusion detection. This is a comprehensive handbook introducing the reader to the problem of intrusion detection, exploring the main concepts and principals of intrusion detection technology, and giving an...

Autonomic Computing: Concepts, Infrastructure, and Applications
Autonomic Computing: Concepts, Infrastructure, and Applications
Advances in networking and computing technologies, and software tools have resulted in an explosive growth in applications and information services that influence all aspects of our life. These sophisticated applications and services are complex, heterogeneous, and dynamic. Further, the underlying information infrastructure (e.g., the Internet)...
E-Commerce: A Control and Security Guide
E-Commerce: A Control and Security Guide

Once scoffed at during the dot.com year, the formerly staid, old, “brick and mortar” companies have now fully recognized and implemented the value of the Internet. Their new online infrastructure allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and mortar” is now “brick and...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy