Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Your Wireless Network
Hack Proofing Your Wireless Network
When the concept of a network without wires was first suggested more than two
decades ago, it sparked the imagination of scientists, product vendors, and users
around the globe eager for the convenience and flexibility of a free roaming connection.
Unfortunately, as the variety of wireless solutions began to emerge, anticipation...
Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Special Edition Using Microsoft Office Project 2003
Special Edition Using Microsoft Office Project 2003

This book provides readers with everything they need to make the most of Project 2003. Project 2003 helps users manage projects indepently or as part of a large organization. Business professionals can gain access into their portfolio of projects, and collaborate on the documents, issues and risks associated with those...

The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)
The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)

Extensively revised to reflect improved Scrum practices and tools, this edition adds an all-new section of tips from the field. 



The 1st Edition has a 5-Star Amazon Customer Rating and 135 reviews.

Thousands of organizations are adopting Scrum to
...
The Weed Runners: Travels with the Outlaw Capitalists of America's Medical Marijuana Trade
The Weed Runners: Travels with the Outlaw Capitalists of America's Medical Marijuana Trade


Make no mistake: the US government’s hundred-year-old war on marijuana isn’t over. Some 20 million Americans have been arrested on marijuana charges so far. The American marijuana industry remains underground, where modern-day moonshiners who view themselves as...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Project Management and Engineering Research: AEIPRO 2017 (Lecture Notes in Management and Industrial Engineering)
Project Management and Engineering Research: AEIPRO 2017 (Lecture Notes in Management and Industrial Engineering)
This is the Proceedings of the 20th International Congress on Project Management and Engineering, that was held at the Technical University of Cartagena, Spain, from July 13 to 15, 2016. It brings together a collection of recent works of researchers and professionals in the Project Management and Engineering fields of Civil Engineering and...
Kali Linux Network Scanning Cookbook
Kali Linux Network Scanning Cookbook

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali...
Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)
Charging for Mobile All-IP Telecommunications (Wireless Communications and Mobile Computing)

This book provides a complete and comprehensive overview of 3G UMTS charging services

Evolving from offline billing of traditional telecommunications, charging for IP services in mobile networks is challenging; charging convergence is one of the major trends in the telecom industry. Advanced mobile...

Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

Statistics and Data Analysis for Financial Engineering (Springer Texts in Statistics)
Statistics and Data Analysis for Financial Engineering (Springer Texts in Statistics)

Financial engineers have access to enormous quantities of data but need powerful methods for extracting quantitative information, particularly about volatility and risks. Key features of this textbook are: illustration of concepts with financial markets and economic data, R Labs with real-data exercises, and integration of graphical and...

unlimited object storage image
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy