Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Viruses For Dummies
Computer Viruses For Dummies

Build up your defenses against online germ warfare

Discover how viruses work and how to outsmart the cyber-thugs who create them

Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your...

Knots: The Complete Visual Guide
Knots: The Complete Visual Guide
Knots have been used throughout history, and they remain a valuable resource today. Learning to tie knots is a handy, enjoyable skill, requiring only simple equipment to get started.

This book contains a selection of knots intended to be practical and instructive. Many of them have specific purposes,
...
The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

The C# Programming Language
The C# Programming Language

C# is a simple, modern, object-oriented, and type-safe programming language that combines the high productivity of rapid application development languages with the raw power of C and C++. Written by the language's architect and design team members, The C# Programming Language is the definitive...

OS X Mavericks All-in-One For Dummies
OS X Mavericks All-in-One For Dummies

Your all-in-one guide to all things OS X Mavericks

This fun and friendly For Dummies guide is your ticket to taking advantage of all the features of Apple’s latest desktop operating system – OS X Mavericks. You’ll get to know OS X, customize Mavericks for your needs, become more productive, and take...

Practical Machine Learning with Rust: Creating Intelligent Applications in Rust
Practical Machine Learning with Rust: Creating Intelligent Applications in Rust

Explore machine learning in Rust and learn about the intricacies of creating machine learning applications. This book begins by covering the important concepts of machine learning such as supervised, unsupervised, and reinforcement learning, and the basics of Rust. Further, you’ll dive into the more specific fields of machine...

Pragmatic Version Control Using CVS
Pragmatic Version Control Using CVS
This book is a recipe-based approach to using the CVS Version Control system that will get you up and running quickly--and correctly. All projects need version control: it's a foundational piece of any project's infrastructure. Yet half of all project teams in the U.S. don't use any version control at all. Many others don't use it well, and end...
Hacker Attack
Hacker Attack
Hacker Attack is the only book about computer security that is at once entertaining, understandable, and practical. You'll be fascinated as you read about hackers, crackers and whackers--people who spend their time trying to break into your computer, spreading computer viruses, or peeping (and recording what they see!) as you surf the Internet or...
A Short Introduction to Intuitionistic Logic (University Series in Mathematics)
A Short Introduction to Intuitionistic Logic (University Series in Mathematics)
`This is the most welcome addition to the literature on intuitionistic logic, providing a substantial reference of value comparable to that of better established references for classical mathematical logic. The development of Mints' book is natural, elegant and accessible, with a minimum of fuss but no lack of attention to...
Windows 2000 Security (Networking)
Windows 2000 Security (Networking)
Due to the necessity of instant communication and data transfer in today's business world, a secure computer network is critical. Security is not just your company's firewall. A more detailed strategy is needed to ward off threats from viruses, hackers, and unauthorized users. Microsoft Windows 2000 Security is your complete guide to system and...
VLSI Physical Design: From Graph Partitioning to Timing Closure
VLSI Physical Design: From Graph Partitioning to Timing Closure

Physical design of integrated circuits remains one of the most interesting and challenging arenas in the field of Electronic Design Automation. The ability to integrate more and more devices on our silicon chips requires the algorithms to continuously scale up. Nowadays we can integrate 2e9 transistors on a single 45nm-technology chip. This...

SQL For Dummies
SQL For Dummies

Uncover the secrets of SQL and start building better relational databases today!

This fun and friendly guide will help you demystify database management systems so you can create more powerful databases and access information with ease. Updated for the latest SQL functionality, SQL For Dummies, 8th Edition
...

unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy