Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Covid-19 Vaccine Guide: The Quest for Implementation of Safe and Effective Vaccinations
The Covid-19 Vaccine Guide: The Quest for Implementation of Safe and Effective Vaccinations
What you should know about the Covid-19 vaccines from top experts in the field.

As the SARS-Cov2 virus emerged and spread globally in early 2020, unprecedented international efforts began to develop and test vaccines to control the devastating pandemic. This book focuses on the remarkable progress in developing
...
Introduction to Cryptography (Undergraduate Texts in Mathematics)
Introduction to Cryptography (Undergraduate Texts in Mathematics)

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

iOS Application Security: The Definitive Guide for Hackers and Developers
iOS Application Security: The Definitive Guide for Hackers and Developers
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them.

After a crash course
...
Configuring Juniper Networks NetScreen & SSG Firewalls
Configuring Juniper Networks NetScreen & SSG Firewalls
Juniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.

Configuring
...
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
A Practical Guide to The Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)
A Practical Guide to The Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)

This best-selling text has been revised to reflect the requirements of the 17th Edition of the IEEWiring Regulations (BS 7671: 2008).

It includes essential information on the new rules applied to special installations or locations, such as bathrooms, swimming pool locations, camping/caravan sites, marinas,...

Design of Steel Structures to Eurocodes (Springer Tracts in Civil Engineering)
Design of Steel Structures to Eurocodes (Springer Tracts in Civil Engineering)

This textbook describes the rules for the design of steel and composite building structures according to Eurocodes, covering the structure as a whole, as well as the design of individual structural components and connections. It addresses the following topics: the basis of design in the Eurocodes framework; the loads applied to...

New World Witchery: A Trove of North American Folk Magic
New World Witchery: A Trove of North American Folk Magic

Explore Nearly 500 Samples of Folk Magic, Stories, Artifacts, Rituals, and Beliefs

One of the most comprehensive collections of witchcraft and folk magic ever written, New World Witchery shows you how to integrate folk traditions into your life and deepen your understanding of magic. Folklore...

Webmaster in a Nutshell, Third Edition
Webmaster in a Nutshell, Third Edition
This book is for web developers, or anyone who works at the content end of the World Wide Web. Do you author or maintain web documents? Are you a programmer developing web-based client or server applications? Are you the administrator of a web site, responsible for maintaining and updating server software?

There are innumerable books and
...
Compression Algorithms for Real Programmers (The For Real Programmers Series)
Compression Algorithms for Real Programmers (The For Real Programmers Series)
In life, time is money, and on the Internet, the size of data is money. Small programs and small files take less disk space and cost less to send over the Internet. Compression Algorithms for Real Programmers describes the basic algorithms and approaches for compressing information so you can create the smallest files possible....
Network Backup with Bacula [How-to]
Network Backup with Bacula [How-to]

In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks.

"Network Backup with Bacula" is a practical guide to setting up the Bacula backup system...

The Audit Committee Handbook
The Audit Committee Handbook
Since the publication of the third edition of The Audit Committee Handbook in
1999, a number of major accounting scandals (e.g., Enron,WorldCom, and others)
as well as the demise of the international accounting firm of Anderson LLP have
shaken the global capital markets. As a result, the U.S. Congress enacted the Sarbanes-
Oxley
...
unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy