Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks.

...
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity

Are you looking for the right Guide to improve your technical skills in programming and cybersecurity?

Would you like to start your own business or look for a job with better knowledge in computer programming and data protection?

Would you like to be sure to have in your hands a manual...

CORS in Action: Creating and consuming cross-origin APIs
CORS in Action: Creating and consuming cross-origin APIs

Summary

CORS in Action introduces Cross-Origin Resource Sharing (CORS) from both the server and the client perspective. It starts with the basics: how to make CORS requests and how to implement CORS on the server. It then explores key details such as performance, debugging, and security. API authors will...

Swift High Performance
Swift High Performance

Leverage Swift and enhance your code to take your applications to the next level

About This Book

  • Build solid, high performance applications in Swift
  • Increase your efficiency by getting to grips with concurrency and parallel programming
  • Use Swift to design...
PHP Objects, Patterns and Practice, Third Edition
PHP Objects, Patterns and Practice, Third Edition

This book takes you beyond the PHP basics to the enterprise development practices used by professional programmers. Updated for PHP 5.3 with new sections on closures, namespaces, and continuous integration, this edition will teach you about object features such as abstract classes, reflection, interfaces, and error handling. You’ll also...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Diagnosing Your Health Symptoms For Dummies®
Diagnosing Your Health Symptoms For Dummies®

Everybody develops new health problems sometimes. Often, these problems are familiar and not especially worrying. When you wake up with a slightly sore throat or get a mild headache after a long, busy day, for example, the chances are that you’ve already had this kind of thing before and you know instinctively what to do about it. You...

SELinux System Administration
SELinux System Administration

NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security...

Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of...
Video Systems in an IT Environment, Second Edition: The Basics of Professional Networked Media and File-based Workflows
Video Systems in an IT Environment, Second Edition: The Basics of Professional Networked Media and File-based Workflows
Astute sailors know the optimal time to catch the tidal fl ood toward the harbor. If it is missed, a ship may be caught in a storm or stranded at sea. An able captain and crew never pass up favorable currents. Today there is a different tidal fl ood that many captains of ship are seeking to ride to safe harbor. What is it? It is the tidal swell of...
Basic Environmental Engineering: (as Per the New Syllabus of R.T.U. and Other Universities)
Basic Environmental Engineering: (as Per the New Syllabus of R.T.U. and Other Universities)

Environmental engineering is one of the most popular, complex and fast growing disciplines in engineering. The scope of environment includes issues from public health, aesthetics, and impact of all development activities, pollution control legislation, standards, regulations, guidelines and their enforcement. Traditionally the application of...

Nonviral Vectors for Gene Therapy, Part 2, Volume 54, Second Edition (Advances in Genetics)
Nonviral Vectors for Gene Therapy, Part 2, Volume 54, Second Edition (Advances in Genetics)
Since the pioneering discovery by Felgner et al. (1987) that cationic lipid can efficiently transfect cells, there was a surge of research activity in this area. The field received another boost when Nabel et al. (1993) successfully completed a small phase I clinical trial in gene therapy of melanoma using cationic liposome as a...
unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy