Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking Exposed Wireless, Second Edition
Hacking Exposed Wireless, Second Edition

The latest wireless security solutions

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily...

Fundamentals of Wireless Sensor Networks: Theory and Practice
Fundamentals of Wireless Sensor Networks: Theory and Practice

In this book, the authors describe the fundamental concepts and practical aspects of wireless sensor networks. The book provides a comprehensive view to this rapidly evolving field, including its many novel applications, ranging from protecting civil infrastructure to pervasive health monitoring. Using detailed examples and illustrations,...

Microsoft Outlook 2010 Inside Out
Microsoft Outlook 2010 Inside Out

You're beyond the basics, so dive right in and take control of your schedule and business communications from the inside out! This in-depth reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds in a supremely organized format. It's all muscle and no fluff. Discover how the experts manage...

IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data

Implement an Effective Security Metrics Project or Program

IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the...

The Gale Encyclopedia of Children's Health: Infancy Through Adolescence
The Gale Encyclopedia of Children's Health: Infancy Through Adolescence

The safety of children is potentially at risk from accidents and injuries, as well as crime. Providing a safe environment, putting prevention measures into practice, and teaching children methods of self-protection are all ways to reduce the potential for harm to children.

Description

Accidents are the leading cause of...

Options Trading for the Conservative Investor: Increasing Profits without Increasing Your Risk (2nd Edition)
Options Trading for the Conservative Investor: Increasing Profits without Increasing Your Risk (2nd Edition)

“The author’s option trading guidelines include important issues often overlooked by investors. Attention conservative investors! Michael C. Thomsett’s Options Trading for the Conservative Investor has hit a bull’s-eye...for you!”

Marty...

Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Well-known security experts decipher the most challenging aspect of cloud computing-security

Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access...

A Practical Guide to The Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)
A Practical Guide to The Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)

This best-selling text has been revised to reflect the requirements of the 17th Edition of the IEEWiring Regulations (BS 7671: 2008).

It includes essential information on the new rules applied to special installations or locations, such as bathrooms, swimming pool locations, camping/caravan sites, marinas,...

Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Location-Based Services Handbook: Applications, Technologies, and Security
Location-Based Services Handbook: Applications, Technologies, and Security

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of...

Mastering Autodesk Revit MEP 2011 (Autodesk Official Training Guides)
Mastering Autodesk Revit MEP 2011 (Autodesk Official Training Guides)

Master all the core concepts and functionality of Revit MEP

Revit MEP has finally come into its own, and this perfectly paced reference covers all the core concepts and functionality of this fast-growing mechanical, electrical, and plumbing software. The authors collate all their years of experience to develop this...

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy