Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Photography Hacks : 100 Industrial-Strength Tips & Tools
Digital Photography Hacks : 100 Industrial-Strength Tips & Tools
Going beyond the standard fare of most digital photography books, Digital Photography Hacks shares the knowledge that professional photographers have learned through thousands of shots' worth of experience and years of experimentation. With exquisite, full-color photos throughout, the book presents 100 proven...
Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and
...

Human Geoscience (Advances in Geological Science)
Human Geoscience (Advances in Geological Science)
This book is a product of the joint efforts of interdisciplinary academic fields under the integrative framework of human geoscience. Human geoscience is a new genre of geoscience concerned with the natural phenomena that occur on the surface of the Earth and their relations with human activities. It therefore has connections with many...
Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Biopharmaceuticals in Plants: Toward the Next Century of Medicine
Biopharmaceuticals in Plants: Toward the Next Century of Medicine

Transgenic plants present enormous potential to become one of the most cost-effective and safe systems for large-scale production of proteins for industrial, pharmaceutical, veterinary, and agricultural uses. Over the past decade, much progress has been made with respect to the development of vaccines, antibodies, and other therapeutic...

Get Started in Computing
Get Started in Computing

Get Started in Computing is for anyone who wants to learn how to make good use of their PC. It doesn ’ t assume that you are a complete novice – there are very few of those left! You have probably used a PC a little – and can steer the mouse and use the keyboard (at least a bit).

You may have done a little...

The Handbook of Traditional and Alternative Investment Vehicles: Investment Characteristics and Strategies
The Handbook of Traditional and Alternative Investment Vehicles: Investment Characteristics and Strategies

A comprehensive volume that covers a complete array of traditional and alternative investment vehicles

This practical guide provides a comprehensive overview of traditional and alternative investment vehicles for professional and individual investors hoping to gain a deeper understanding of the benefits and pitfalls of using...

Area-Wide Control of Insect Pests: From Research to Field Implementation
Area-Wide Control of Insect Pests: From Research to Field Implementation
The world population is still growing at an alarming rate, requiring ever increasing productivity and less waste in agriculture to cope with the increasing demands to satisfy food security for all humans. Alleviation of poverty is in many countries hampered by a myriad of insect pests that cause enormous economic...
Vmware Vcloud Security
Vmware Vcloud Security

Welcome to VMware vCloud Security. In this book, you will learn how to mitigate  the security threats on a private cloud running VMware vCloud Director. This  book will enable the reader with the knowledge, skills, and abilities to build a  highly secured private cloud running VMware vCloud. We will also look at a ...

Breakthrough Discoveries in Information Technology Research: Advancing Trends
Breakthrough Discoveries in Information Technology Research: Advancing Trends

This collection, entitled Breakthrough Discoveries in Information Technology Research: Advancing Trends , aims to inform researchers and practitioners of novel and emerging research in information science and technology, allowing for the discussion and dissemination of critical concepts that will promote further study and innovation....

The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

unlimited object storage image
Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy