Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...

Resveratrol in Health and Disease (Oxidative Stress and Disease)
Resveratrol in Health and Disease (Oxidative Stress and Disease)

Practicing evidenced-based medicine some 25 centuries ago, Hippocrates proclaimed "Let food be thy medicine and medicine be thy food." This advice parallels the common American saying, "You are what you eat," and is supported by a National Institute of Health recommendation to consume as many as eight servings of fruits...

Herbal Supplements: Efficacy, Toxicity, Interactions with Western Drugs, and Effects on Clinical Laboratory Tests
Herbal Supplements: Efficacy, Toxicity, Interactions with Western Drugs, and Effects on Clinical Laboratory Tests

This book focuses on efficacy, toxicity, drug interactions, and abnormal clinical laboratory tests resulting from the use of herbal remedies. Although a few herbal remedies are safe and have efficacy (for example saw palmetto), many herbal remedies are toxic. This book guides in the interpretation of abnormal test results in otherwise healthy...

The Windows 2000 Device Driver Book, A Guide for Programmers, Second Edition
The Windows 2000 Device Driver Book, A Guide for Programmers, Second Edition

The #1 book on Windows driver development - totally updated for Windows 2000!

With The Windows 2000 Device Driver Book, any experienced Windows programmer can master driver development start to finish: planning, implementation, testing, debugging, installation, and distribution. Totally updated to reflect...

Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

Concurrent Programming on Windows
Concurrent Programming on Windows

“When you begin using multi-threading throughout an application, the importance of clean architecture and design is critical. . . . This places an emphasis on understanding not only the platform’s capabilities but also emerging best practices. Joe does a great job interspersing best practices alongside theory...

Pro SQL Server 2005 Assemblies
Pro SQL Server 2005 Assemblies
The main aim of this book is to show you each of the different types of .NET assemblies now
possible within SQL Server 2005. This is a major leap in technology for developers and database
administrators alike. Knowing when, how, and why to use this technology is crucial in
continuing to offer stable and efficient database servers and
...
Don't Get Bitten: The Dangers of Things That Bite or Sting
Don't Get Bitten: The Dangers of Things That Bite or Sting
Loaded with information on how to avoid...venom and...as well as practical tips, for staying safe from those bites. -- Billings Gazette

The little book loaded with information on how to avoid or deal with bites and stings in the great outdoors.

Includes:
Practical tips on staying safe from dangerous bites
...

Unknown Quantity: A Real and Imaginary History of Algebra
Unknown Quantity: A Real and Imaginary History of Algebra
Prime Obsession taught us not to be afraid to put the math in a math book. Unknown Quantity heeds the lesson well. So grab your graphing calculators, slip out the slide rules, and buckle up! John Derbyshire is introducing us to algebra through the ages—and it promises to be just what his die-hard fans have been waiting...
The Introverted Presenter: Ten Steps for Preparing and Delivering Successful Presentations
The Introverted Presenter: Ten Steps for Preparing and Delivering Successful Presentations

The introvert is a personality type that draws energy from the outside inward. According to standard personality testing assessments, most people are introverts and no group is more introverted than technical professionals. Introverts are congenitally programmed to recoil from the prospect of public speaking with fear and loathing, yet making...

CCDA: Cisco Certified Design Associate Study Guide, Second Edition (Exam 640-861)
CCDA: Cisco Certified Design Associate Study Guide, Second Edition (Exam 640-861)

Here’s the book you need to prepare for Cisco’s revised CCDA exam, 640-861. This Study Guide provides:

  • In-depth coverage of every CCDA exam objective
  • Practical information on Cisco design solutions
  • Hundreds of challenging practice questions

Authoritative coverage of all...

Joint Cognitive Systems: Foundations of Cognitive Systems Engineering
Joint Cognitive Systems: Foundations of Cognitive Systems Engineering
This book was written by pioneers in the field and offers a principled approach to studying human work with complex technology. … It seems destined to become a classic in the field.
- Books-on-Line

In the nine compact chapters of Joint Cognitive Systems (JCS), two recognized figures in the field of human factors provide an...

Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy