Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Next Generation Wireless Applications
Next Generation Wireless Applications
"There is no other book I've come across that offers this breadth of knowledge and makes you that excited about the possibilities in this fast paced market. Next Generation Wireless Applications is written in a very accessible way and packed full of useful insights from the author reflecting his extensive experience...
The Definitive Guide to CentOS
The Definitive Guide to CentOS
CentOS is just like Red Hat, but without the price tag and with the virtuous license. When belts have to be tightened, we want to read about an OS with all the features of a commercial Linux variety, but without the pain. The Definitive Guide to CentOS is the first definitive reference for CentOS and focuses on CentOS alone, the workhorse...
Windows Forensic Analysis DVD Toolkit, Second Edition
Windows Forensic Analysis DVD Toolkit, Second Edition

"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis."
-Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer

"The Registry Analysis chapter alone is worth the price of the book."
-Troy Larson, Senior
...

Practical Signcryption (Information Security and Cryptography)
Practical Signcryption (Information Security and Cryptography)

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...

Enterprise DevOps Framework: Transforming IT Operations
Enterprise DevOps Framework: Transforming IT Operations

Transform your IT organization from one weighed down by set practices to one with a DevOps culture and a cloud-first strategy that is optimized by automation and other lean practices. In this engaging read, you will discover the opportunities, challenges, lessons, and rewards that CA Technologies encountered when making their agile...

The Art and Science of Trauma and the Autobiographical: Negotiated Truths (Palgrave Studies in Life Writing)
The Art and Science of Trauma and the Autobiographical: Negotiated Truths (Palgrave Studies in Life Writing)

This book examines posttraumatic autobiographical projects, elucidating the complex relationship between the ‘science of trauma’ (and how that idea is understood across various scientific disciplines), and the rhetorical strategies of fragmentation, dissociation, reticence and repetitive...

MCSE Training Kit—Microsoft Exchange 2000 Server Implementation and Administration
MCSE Training Kit—Microsoft Exchange 2000 Server Implementation and Administration
This official MCSE TRAINING KIT teaches IT professionals how to set up and support Exchange 2000 Server-as they prepare for the corresponding MCP exam. Topics include planning an implementation or upgrade to Exchange 2000 Server; configuring clients and servers, Internet protocols and services, mail and messaging systems, and security; implementing...
Digital Photography Pocket Guide, Third Edition (O'Reilly Digital Studio)
Digital Photography Pocket Guide, Third Edition (O'Reilly Digital Studio)

Even film diehards have a tough time resisting the instant gratification of the digital camera. Today's digital cameras are more affordable then ever before, and they deliver high quality images that are a snap to share. Plus, you can take risks with a digital camera you never would with a film camera. You waste nothing;...

Java All-In-One Desk Reference For Dummies
Java All-In-One Desk Reference For Dummies
9 books in 1— your key to success with Java!

Your one-stop guide to the most-used language for application development

There's no question that Java is the popular kid on the block, and knowing Java will definitely boost your reputation as a developer. Here are all the Java essentials packed into one handy resource. Find out...

Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
Philosophy of Religion in the 21st Century (Claremont Studies in the Philosophy of Religion)
Philosophy of Religion in the 21st Century (Claremont Studies in the Philosophy of Religion)

"Scholars who are interested in getting up-to-date in contemporary philosophy of religion will find this book quite valuable."--Daniel A. Dombrowski, Religious Studies Review

The symposia and discussions presented here represent the proceedings of the 1999 annual philosophy of religion conference which took place at
...

Understanding the Local Media
Understanding the Local Media
How will local media deal with the challenge of the Internet? How important is regional news to the nations of the UK? What does the future hold for newspapers, regional television and local radio news? Most adults in the UK read a local newspaper; regional news bulletins are among the most-watched on television; and local radio has a loyal...
unlimited object storage image
Result Page: 210 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy