Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security: A Beginner's Guide, Second Edition
Network Security: A Beginner's Guide, Second Edition
Essential Skills--Made Easy!

Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack...

Design and Analysis of Vaccine Studies (Statistics for Biology and Health)
Design and Analysis of Vaccine Studies (Statistics for Biology and Health)

Widespread immunization has many different kinds of effects in individuals and populations, including in the unvaccinated individuals. The challenge is in understanding and estimating all of these effects. This book presents a unified conceptual framework of the different effects of vaccination at the individual and at the population level....

Pro PHP Security
Pro PHP Security

The Internet is a dangerous place for applications. In fact, it is reasonable to say that you
couldn’t create a less secure system if you tried. It is anonymous, uncontrolled, always on,
and instantly accessible from anywhere. This is a world where every bad actor, cracker, script
kiddie, and scam artist is your
...

Big Book of Windows Hacks
Big Book of Windows Hacks
Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB...
The Definitive Guide to the ARM Cortex-M3, Second Edition
The Definitive Guide to the ARM Cortex-M3, Second Edition

This user's guide does far more than simply outline the ARM Cortex-M3 CPU features; it explains step-by-step how to program and implement the processor in real-world designs. It teaches readers how to utilize the complete and thumb instruction sets in order to obtain the best functionality, efficiency, and reuseability. The author, an ARM...

Linear and Non-Linear Video and TV Applications: Using IPv6 and IPv6 Multicast
Linear and Non-Linear Video and TV Applications: Using IPv6 and IPv6 Multicast

Provides options for implementing IPv6 and IPv6 multicast in service provider networks

New technologies, viewing paradigms, and content distribution approaches are taking the TV/video services industry by storm. Linear and Nonlinear Video and TV Applications: Using IPv6 and IPv6 Multicast identifies five emerging...

Auditing Cloud Computing: A Security and Privacy Guide
Auditing Cloud Computing: A Security and Privacy Guide

The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment

Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just...

Research Directions in Data and Applications Security XVIII
Research Directions in Data and Applications Security XVIII

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and...

Solid/Liquid Separation Lexicon
Solid/Liquid Separation Lexicon
Solid/Liquid Separation (SLS) is a cross-sectional unit operation which is ubiquitous in all sectors of the process industry as well as in environmental protection. Hence process engineers and experts of different fields are frequently confronted with specific Solid/Liquid-Separation terms and definitions they do not use for their daily business....
Restoration and Development of the Degraded Loess Plateau, China (Ecological Research Monographs)
Restoration and Development of the Degraded Loess Plateau, China (Ecological Research Monographs)

This book presents state-of-the-art scientific evidence and technological innovations to restore lands on the Loess Plateau of China, known worldwide for its serious land degradation and desertification problems. Supported by a rapidly developing Chinese economy and the dissemination of effective technology, the Grain-for-Green Project and...

Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Mucosal Immunology and Virology
Mucosal Immunology and Virology

An understanding of virus infection and the underlying role of the immune system in protection against these diseases is vital in today’s medical climate. Previously, only symptoms could be treated, as there were no antiviral therapies. The increasing amounts of research and the huge number of discoveries of immunologic agents and...

unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy