Home | Amazing | Today | Tags | Publishers | Years | Search 
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human...

Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)

Vast amounts of data are nowadays collected, stored and processed, in an effort to assist in  making a variety of administrative and governmental decisions. These innovative steps considerably improve the speed, effectiveness and quality of decisions. Analyses are increasingly performed by data mining and profiling technologies that...

Soil: The Skin of the Planet Earth
Soil: The Skin of the Planet Earth

The main focus of this monograph is to explain the important role of soil and the environment to a broad audience. Soil is one of the five essential factors crucial for human life. On the one hand the authors describe a responsible approach and use of soil, established on a basic knowledge of the nature of soil and the countless ongoing...

Wetlands and Water Framework Directive: Protection, Management and Climate Change (GeoPlanet: Earth and Planetary Sciences)
Wetlands and Water Framework Directive: Protection, Management and Climate Change (GeoPlanet: Earth and Planetary Sciences)

This book compares the lessons learned from a wetland-perspective approach to the changing climate and the requirements of the Water Framework Directive (WFD) with regard to environmental conservation. Examples from Germany and Poland are discussed due to the efficiency of their respective implementations of water conservation policies....

Managing Virtual Infrastructure with Veeam® ONE(TM)
Managing Virtual Infrastructure with Veeam® ONE(TM)

Discover ways to manage your virtual infrastructure with Veeam® ONE™ in a development environment

About This Book

  • Implement Veeam® ONE™ for 24/7, real-time monitoring and notifications
  • Virtualize your datacenter/server estate and effectively manage your...
The Neutrophils: New Outlook for Old Cells (3rd Edition)
The Neutrophils: New Outlook for Old Cells (3rd Edition)

This is a third edition of the popular book, which presents an overview of the most recent findings in the biology of neutrophils. These cells are critically important for protection against bacterial and viral infections and have been recently demonstrated to be a major contributor to tumor associated immune suppression. In addition,...

Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Mastering Sublime Text
Mastering Sublime Text

When it comes to cross-platform text and source code editing, Sublime Text has few rivals. This book will teach you all its great features and help you develop and publish plugins. A brilliantly inclusive guide.

Overview

  • Discover efficient, keyboard-driven text editing
  • Recognize the latest...
Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)
Promoting Balanced Competitiveness Strategies of Firms in Developing Countries (Innovation, Technology, and Knowledge Management)

Since the pioneering work of Joseph Schumpeter (1942), it has been assumed that innovations typically play a key role in firms’ competitiveness.  This assumption has been applied to firms in both developed and developing countries. However, the innovative capacities and business environments of firms in developing countries are...

The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards
The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards

Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features...

OAuth 2.0 Identity and Access Management Patterns
OAuth 2.0 Identity and Access Management Patterns

Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.

Overview

  • Build web, client-side, desktop, and server-side...
MCSA Windows Server 2012 R2 Configuring Advanced Services Study Guide: Exam 70-412
MCSA Windows Server 2012 R2 Configuring Advanced Services Study Guide: Exam 70-412

The bestselling MCSA study guide, with expert instruction and hands-on practice

MCSA Windows Server 2012 R2 Configuring Advanced Services Study Guide provides focused preparation for exam 70-412 and is fully updated to align with the latest Windows Server 2012 R2 objectives. This comprehensive guide covers 100 percent...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy