Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
iOS Hacker's Handbook
iOS Hacker's Handbook

Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS...

Radiation Protection In Veterinary Medicine: Recommendations Of The National Council On... (N C R P Report)
Radiation Protection In Veterinary Medicine: Recommendations Of The National Council On... (N C R P Report)
This Report was developed under the auspices of Program Area Committee 2 of the National Council on Radiation Protection and Measurements (NCRP), the committee concerned with operational radiation safety. The Report provides radiation protection guidance for the use of ionizing and nonionizing radiation in veterinary practice,...
Building DMZs for Enterprise Networks
Building DMZs for Enterprise Networks
During the course of the last few years, it has become increasingly evident that there is
a pronounced need for protection of internal networks from the outside world. As
machine technologies have improved and extensive shifts in the functions that a user
can accomplish through more user-friendly interfaces have occurred, many more
...
CISA Certified Information Systems Auditor All-in-One Exam Guide
CISA Certified Information Systems Auditor All-in-One Exam Guide

"All-in-One is All You Need."

CISA Certified Information Systems Auditor All in One Exam Guide

Get complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit expert, this...

Microsoft Outlook 2010 Inside Out
Microsoft Outlook 2010 Inside Out

You're beyond the basics, so dive right in and take control of your schedule and business communications from the inside out! This in-depth reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds in a supremely organized format. It's all muscle and no fluff. Discover how the experts manage...

Locksmith and Security Professionals' Exam Study Guide
Locksmith and Security Professionals' Exam Study Guide
Get the Solid Preparation Needed to Pass Your Security Certification Exam on the First Try

Filled with career-building instruction and guidance, Locksmith and Security Professionals' Exam Study Guide is a hands-on learning tool that will help you pass a wide variety of...

Practical Signcryption (Information Security and Cryptography)
Practical Signcryption (Information Security and Cryptography)

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...

Diagnosis and Treatment of Radiation Injuries (Safety Report, Iaea Comprehensive No Inis Ser. Series, 8000)
Diagnosis and Treatment of Radiation Injuries (Safety Report, Iaea Comprehensive No Inis Ser. Series, 8000)
According to the International Basic Safety Standards an accident is “any unintended event, including operating errors, equipment failures or other mishaps, the consequences or potential consequences of which are not negligible from the point of view of protection or safety” [1].

A radiological accident
...
Windows .NET Server 2003 Registry
Windows .NET Server 2003 Registry

Provides a historical overview of the Registry and outlines the differences between Windows 9x/ME and Windows NT/2000/XP/.NET Registries.


Enabling system, network, and security administrators to master Registry concepts and architecture, this book provides a historical overview of the Registry and outlines the differences...

Critical Information Infrastructures: Resilience and Protection
Critical Information Infrastructures: Resilience and Protection
A very interesting and informative book that covers a wide but interlinked set of subjects. Indeed, attention has been paid to assisting the reader to understand complex and current issues, and it can be said that the work is extremely well researched, up-to-date and of interest to a wide audience including practising managers, government...
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Windows Server 2008 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Hyper-V is one of the top virtualization products, and this practical guide focuses on the essentials of Windows Server 2008 Hyper-V. Written by the Microsoft team behind the Hyper-V product, this book shows you how to perform key virtualization scenarios, such as server consolidation, software test and development, and a dynamic data center and...
The Definitive Guide to the ARM Cortex-M3
The Definitive Guide to the ARM Cortex-M3
This user's guide does far more than simply outline the ARM Cortex-M3 CPU features; it explains step-by-step how to program and implement the processor in real-world designs. It teaches readers how to utilize the complete and thumb instruction sets in order to obtain the best functionality, efficiency, and reuseability. The author, an ARM engineer...
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy