Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning DCOM
Learning DCOM

DCOM -- the Distributed Component Object Model -- is a recent upgrade of a time-honored and well-tested technology promoted by Microsoft for distributed object programming. Now that components are playing a larger and larger part in Windows 98, Windows NT 4.0, and Windows 2000, every Windows programmer will want to understand the...

Cuckoo Malware Analysis
Cuckoo Malware Analysis

Analyze malware using Cuckoo Sandbox

Overview

  • Learn how to analyze malware in a straightforward way with minimum technical skills
  • Understand the risk of the rise of document-based malware
  • Enhance your malware analysis concepts through illustrations, tips and tricks,...
Windows 10 Troubleshooting (Windows Troubleshooting Series)
Windows 10 Troubleshooting (Windows Troubleshooting Series)

Learn how to troubleshoot Windows 10 the way the experts do, whatever device or form-factor you’re using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, the solution, and the tools required. Discover the connections between the...

Traumatic Dental Injuries in Children: A Clinical Guide to Management and Prevention
Traumatic Dental Injuries in Children: A Clinical Guide to Management and Prevention

This book is a clinical guide to the prevention and management of traumatic dental injuries, including crown and root fractures and luxation injuries, in children of all ages.  Readers will find clear descriptions of the challenges posed by the pediatric population, the evaluation of injuries, diagnosis, management, and...

Cryptography: Cracking Codes (Intelligence and Counterintelligence)
Cryptography: Cracking Codes (Intelligence and Counterintelligence)

While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryptionessentially the need to code information...

Sweet, Savory, and Free: Insanely Delicious Plant-Based Recipes without Any of the Top 8 Food Allergens
Sweet, Savory, and Free: Insanely Delicious Plant-Based Recipes without Any of the Top 8 Food Allergens
Eat Sweet, Savory, and Free with Debbie Adler’s Mouthwatering Plant-Based Recipes, Free of the Top 8 Allergens

In 2013, Debbie Adler’s Sweet Debbie’s Organic Treats: Allergy-Free and Vegan Recipes From the Famous Los Angeles Bakery proved that cooking for those with allergies and food
...
CCSP CSI Exam Cram 2 (Exam Cram 642-541)
CCSP CSI Exam Cram 2 (Exam Cram 642-541)

The Exam Cram Method of study focuses on exactly what you need to get certified now.

The Cisco SAFE Implementation Exam (which carries the examination ID number of 642-541) is intended to evaluate whether you understand the ideas behind a secured network architecture and...

Advanced Topics in Information Technology Standards And Standardization Research
Advanced Topics in Information Technology Standards And Standardization Research
More than five years have passed since Idea Group Publishing (IGP) published my first edited book on IT standards and standardisation. Back then, this was a fairly arcane topic, discussed in only a comparably small number of papers, in very few books, and at even fewer conferences.

Luckily, this situation is improving. More and more
...
Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
Instant Messaging (IM) is quickly rivaling e-mail as the electronic communications tool of choice in offices worldwide. Already used by over 100 million people globally, IM will be used more often than e-mail by 2005. Employees at 70% of U.S. companies are expected to use IM this year -- whether for legitimate business reasons or for personal...
Technology and Safety of Marine Systems (Ocean Engineering Series)
Technology and Safety of Marine Systems (Ocean Engineering Series)
Traditionally society has regulated hazardous industries by detailed references to engineering codes, standards and hardware requirements. These days a risk-based approach is adopted. Risk analysis involves identifying hazards, categorizing the risks, and providing the necessary decision support to determine the necessary arrangements and...
One Simple Idea: Turn Your Dreams into a Licensing Goldmine While Letting Others Do the Work
One Simple Idea: Turn Your Dreams into a Licensing Goldmine While Letting Others Do the Work

Turn your one simple idea into millions―without lifting a finger!

“Ever heard of Teddy Ruxpin or Lazer Tag? Both have Stephen Key’s mark on them. He is the Yoda or ‘renting’ ideas for serious passive income. From how-to to war stories, this is a great book.”
―Tim Ferriss, author
...

The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for...

Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy