Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
SQL for Dummies
SQL for Dummies
Discover how SQL:2003 handles images, XML files, and more

Use SQL to build databases, keep them safe, and access their information

Relationships are everything, especially when it comes to databases – so if you work with them, form a relationship with this book. It helps you use SQL to build databases, protect them from...

Sams Teach Yourself Facebook in 10 Minutes
Sams Teach Yourself Facebook in 10 Minutes

Sams Teach Yourself Facebook in 10 Minutes offers straightforward, practical answers

when you need fast results. By working through 10-minute lessons, you’ll learn everything you

need to know to quickly and easily get up to speed with Facebook.

...
Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Buying & Selling Music, Instruments, and Music Collectibles on eBay
Buying & Selling Music, Instruments, and Music Collectibles on eBay
This book is about eBay but with a twist. The focus is on buying and selling music-related items on eBay. We found a niche and it’s all about music!

It’s always fun to write about something you love. In this case, I’m truly blessed because I’m writing about two of my favorite things: eBay and music.

So,
...
Pregnancy For Dummies
Pregnancy For Dummies
Now updated — the bestselling guide to a safe and healthy pregnancy

Are you pregnant, or hope to be? This friendly, reassuring guide continues its legacy of providing moms- and dads-to-be with expert advice on every aspect of pregnancy and childbirth — from conception to the delivery room to breastfeeding and...

Principles of Gender-Specific Medicine
Principles of Gender-Specific Medicine

Principles of Gender-Specific Medicine examines how normal human biology differs between men and women and how the diagnosis and treatment of disease differs as a function of gender. This revealing research covers various conditions that predominantly occur in men, and as well conditions that predominantly occur in women. Among the...

Transient-Induced Latchup in CMOS Integrated Circuits
Transient-Induced Latchup in CMOS Integrated Circuits

The book all semiconductor device engineers must read to gain a practical feel for latchup-induced failure to produce lower-cost and higher-density chips. Transient-Induced Latchup in CMOS Integrated Circuits equips the practicing engineer with all the tools needed to address this regularly occurring problem while becoming more proficient at...

Python in Practice: Create Better Programs Using Concurrency, Libraries, and Patterns (Developer's Library)
Python in Practice: Create Better Programs Using Concurrency, Libraries, and Patterns (Developer's Library)

Winner of the 2014 Jolt Award for "Best Book"

 

“Whether you are an experienced programmer or are starting your career, Python in Practice is full of valuable advice and example to help you improve your craft by thinking about...

CYA Securing IIS 6.0
CYA Securing IIS 6.0
Network System Administrators operate in a high-stress environment, where the competitive demands of the business often run counter to textbook “best practices”. Design and planning lead times can be nonexistent and deployed systems are subject to constant end-runs; but at the end of the day, you, as the Administrator, are held...
Fenaroli's Handbook of Flavor Ingredients, Sixth Edition
Fenaroli's Handbook of Flavor Ingredients, Sixth Edition

The Industry Standard for 38 Years

Since publication of the first edition in 1971, Fenaroli’s Handbook of Flavor Ingredients has remained the standard reference for flavor ingredients throughout the world. Each subsequent edition has listed more flavor ingredients and allied...

Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy