Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
Learn the 14 ways in which you can help make the Internet a safer place for you and your family. You teach your children to look both ways before crossing the street. You tell them not to talk to strangers. But do you really know how to teach them to safely use the Internet? In this book, Linda Criddle, a leading child safety expert, offers a...
Integrating Macs into Windows Networks (Network Pro Library)
Integrating Macs into Windows Networks (Network Pro Library)

Integrate Macs seamlessly into your Windows network

These days, almost every Windows network must include Macs--and not just as second-class citizens with limited connectivity, but as full members of the network. Covering Mac OS X Snow Leopard and Windows Server 2008 R2, Integrating Macs into Windows Networks shows you how...

The Poison Paradox: Chemicals As Friends and Foes
The Poison Paradox: Chemicals As Friends and Foes
To appreciate the dangers and the risks from chemicals of all kinds it is necessary to understand how, when and why they are toxic. This falls within the field of toxicology and is what this book is all about.

I was encouraged to write the book by Dr John Emsley, who is well known for his popular science books on
...
Secure Programming Cookbook for C and C++ : Recipes for Cryptography, Authentication, Input Validation & More
Secure Programming Cookbook for C and C++ : Recipes for Cryptography, Authentication, Input Validation & More
Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation,...
Managing Humans: Biting and Humorous Tales of a Software Engineering Manager
Managing Humans: Biting and Humorous Tales of a Software Engineering Manager
Managing Humans is a selection of the best essays from Michael Lopp's web site, Rands In Repose. Drawing on Lopp's management experiences at Apple, Netscape, Symantec, and Borland, this book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other. It is a place full...
SAP GRC For Dummies (Computer/Tech)
SAP GRC For Dummies (Computer/Tech)
Governance, risk, and compliance—these three big letters can add up to one giant headache. But GRC doesn't have to be a boil on your corporate behind. SAP GRC For Dummies untangles the web of regulations that confronts your company and introduces you to software solutions the not only keep you in compliance, but also make your whole...
Hacking a Terror Network: The Silent Threat of Covert Channels
Hacking a Terror Network: The Silent Threat of Covert Channels
From a counterterrorism perspective, discovering terrorist communication networks
and methods is extremely important.Terrorists have demonstrated the
capability to exchange messages that vary from archaic (using human couriers)
to technologically advanced using “virtual dead-drops.”The popular press is full
of
...
Managing RAID on Linux
Managing RAID on Linux
"Finally, the book contains a good index and a brief appendix giving links to other sources. A very useful volume that should find favour with anyone who wishes to implement RAID on a Linux system." - Steve Boniwell, HP/Works

Redundant Array of Independent Disks (RAID) technology is becoming a standard feature of
...
How to Grow as a Photographer: Reinventing Your Career
How to Grow as a Photographer: Reinventing Your Career

Are you bored producing the same old work, but do it because it’s safe? Are corporate politics, outsourcing, or the digital revolution too much for you to handle? Has a personal tragedy caused you to reevaluate your career path?  If you answered yes to any of these questions, look no further than this inspirational guide.
...

Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime
Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime

We all know that society is less than perfect and that crime could easily touch us all. If yon talk to friends and neighbours you will usually find that most of them have cither been the victim of crime or know somebody who has. People tear crime, they feel helpless because they think that there is nothing they can do to protect themselves,...

Solaris 9 Security (Networking)
Solaris 9 Security (Networking)
Solaris is one of the most widely used operating systems. One of the main reasons for its popularity is its enhanced security. Solaris 9 protects systems from internal and external security threats by restricting access to system data, authenticating and encrypting interactive sessions with the Solaris operating environment, and supporting protocol...
Usability Testing of Medical Devices
Usability Testing of Medical Devices

To paraphrase a popular saying, usability testing should be done early and often. However, it doesn’t have to be an onerous process. Informative, practical, and engaging, Usability Testing of Medical Devices provides a simple, easy to implement general understanding of usability testing. It offers a general...

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy