Home | Amazing | Today | Tags | Publishers | Years | Search 
Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Mobile Opportunistic Networks: Architectures, Protocols and Applications
Mobile Opportunistic Networks: Architectures, Protocols and Applications

The widespread availability of mobile devices coupled with recent advancements in networking capabilities make opportunistic networks one of the most promising technologies for next-generation mobile applications. Are you ready to make your mark?

Featuring the contributions of prominent researchers from academia and industry,...

Development with the Force.com Platform: Building Business Applications in the Cloud (2nd Edition)
Development with the Force.com Platform: Building Business Applications in the Cloud (2nd Edition)

Build Powerful, Scalable, Cloud-Based Enterprise Solutions Fast with the Newest Version of Force.com

 

Using Force.com, you can build enterprise applications with world-class value, scalability, and reliability--and do it in days or weeks, not months...

Springer Handbook of Mechanical Engineering
Springer Handbook of Mechanical Engineering

Mechanical engineering is a broad and complex field within the world of engineering and has close relations to many other fields. It is an important economic factor for all industrialized countries and the global market allows for wide international competition for products and processes in this field. To stay up to date with...

Introduction to Data Mining Using SAS Enterprise Miner
Introduction to Data Mining Using SAS Enterprise Miner

If you have an abundance of data, but no idea what to do with it, this book was written for you! Packed with examples from an array of industries, Introduction to Data Mining Using SAS Enterprise Miner provides you with excellent starting points and practical guidelines to begin data mining today. Author Patricia Cerrito encourages you to...

Product-Focused Software Process Improvement: 12th International Conference, PROFES 2011
Product-Focused Software Process Improvement: 12th International Conference, PROFES 2011

On behalf of the PROFES Organizing Committee we are proud to present the proceedings of the 12th International Conference on Product-Focused Software Process Improvement (PROFES 2011), held in Torre Canne, Italy. Since 1999 PROFES has grown in the software engineering community and has become a premium conference that brings together...

Developments in the Theory of Cationoid Polymerisations
Developments in the Theory of Cationoid Polymerisations

I first met Peter Plesch in the late 1950s when he had established his vacuum techniques in Keele and I was embarking on my PhD. My visit to Keele was to seek advice (freely given) on handling sensitive reaction systems. I rapidly came to appreciate that Peter operated on a somewhat higher intellectual plane than many academics. All...

Linux Command Line and Shell Scripting Bible, Second Edition
Linux Command Line and Shell Scripting Bible, Second Edition

Welcome to the second edition of Linux Command Line and Shell Scripting Bible. Like all books in the Bible series, you can expect to find both hands-on tutorials and real-world information, as well as reference and background information that provides a context for what you are learning. This book is a fairly comprehensive resource on the...

VMware vSphere PowerCLI Reference: Automating vSphere Administration
VMware vSphere PowerCLI Reference: Automating vSphere Administration

The book is, of course, primarily targeted at administrators of vSphere environments who want to automate tasks. But the subjects that we discuss in the book cover so many aspects of the management of a VMware vSphere environment that everyone who comes into contact with a VMware vSphere environment will be able to pick up something...

Practical Lock Picking: A Physical Penetration Tester's Training Guide
Practical Lock Picking: A Physical Penetration Tester's Training Guide
I feel somewhat like an old man remarking in this fashion, but this book is a great example of the wonderful time in which you currently find yourself. To be alive and learning right now—when there are accessible resources such as this about lockpicking, with beautiful illustrations and lessons written with passion visible on...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Result Page: 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy