Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

Handbook of Digital Homecare (Series in Biomedical Engineering)
Handbook of Digital Homecare (Series in Biomedical Engineering)

Digital Homecare is a collection of services to deliver, maintain and improve care in the home environment using the latest ICT technology and devices.

It is important to recognize the wide range of issues that are covered by digital homecare. This book shows a good selection of related issues, be it experience, technologies, managerial...

Introduction to 64 Bit Intel Assembly Language Programming for Linux
Introduction to 64 Bit Intel Assembly Language Programming for Linux
The Intel CPU architecture has evolved over 3 decades from a 1 6 bit CPU with no memory protection, through a period with 32 bit processors with sophisticated architectures into the current series of processors which support all the old modes of operation in addition to a greatly expanded 64 bit mode of operation. Assembly...
iPod: The Missing Manual
iPod: The Missing Manual
With the new Shuffle, the Nano, the Classic, and the Touch, Apple's gotten the world hooked on portable music, pictures, videos--and the iPod. One thing they haven't delivered, though, is an easy guide for getting the most from this sleek entertainment center. Enter iPod: The Missing Manual, 8th Edition--a book as breathtaking, satisfying,...
Options Trading for the Conservative Investor: Increasing Profits without Increasing Your Risk (2nd Edition)
Options Trading for the Conservative Investor: Increasing Profits without Increasing Your Risk (2nd Edition)

“The author’s option trading guidelines include important issues often overlooked by investors. Attention conservative investors! Michael C. Thomsett’s Options Trading for the Conservative Investor has hit a bull’s-eye...for you!”

Marty...

The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Second Edition
This book presents a total systems approach to the all the topics needed for the infosec professional, beginning with defining the position of the information systems security officer (ISSO), to establishing and managing an infosec program.

* Six new chapters present the latest information and resources to counter information security
...
Test Driven Development: A Practical Guide
Test Driven Development: A Practical Guide
Foreword by Ron Jeffries
  • The relentlessly practical TDD guide: real problems, real solutions, real code
  • Includes a start-to-finish project written in Java and using JUnit
  • Introduces TDD frameworks for C++, C#/.NET, Python, VB6, and more
  • For every developer and project manager interested...
Clinical Forensic Medicine: A Physician's Guide (Forensic Science and Medicine)
Clinical Forensic Medicine: A Physician's Guide (Forensic Science and Medicine)

This revised edition has been completely updated and expanded to address the latest developments and professional concerns in forensic medicine. There are new chapters on the medical aspects of police restraint and new material on the potential of police exposure to infection, the role of alcohol and drugs in vehicular accidents, and forensic...

The CISA Prep Guide: Mastering the Certified Information Systems Auditor Exam
The CISA Prep Guide: Mastering the Certified Information Systems Auditor Exam
The first commercially available book to offer CISA study material

The CISA certification is a prerequisite for many audit and security job postings in the marketplace today. Becom-ing certified takes years of experience and exposure to information systems and risk and control techniques. In this book, John Kramer refers to his own experiences...

CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...

MCSA/MCSE Self-Paced Training Kit (Exam 70-284): Implementing and Managing Microsoft Exchange Server 2003
MCSA/MCSE Self-Paced Training Kit (Exam 70-284): Implementing and Managing Microsoft Exchange Server 2003

Ace your preparation for the skills measured by MCP Exam 70-284—and on the job—with this official Microsoft study guide. Work at your own pace through a system of lessons, hands-on exercises, troubleshooting labs, and review questions.

Maximize your performance on the exam by learning how to:

  • Plan, install,...
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy