Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human...

More Joel on Software: Further Thoughts on Diverse and Occasionally Related Matters
More Joel on Software: Further Thoughts on Diverse and Occasionally Related Matters

Since the release of the bestselling title Joel on Software in 2004, requests for a sequel have been relentless. So, we went back to the famed JoelonSoftware.com archives and pulled out a new batch of favorites, many of which have been downloaded over one million times. With Joel’s newest book, More Joel on Software,...

Protecting Oracle Database 12c
Protecting Oracle Database 12c

Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration despite ongoing and new security issues in the software. The book demonstrates, through coded examples, how you can enable the consolidation...

Mathematical Foundations of System Safety Engineering: A Road Map for the Future
Mathematical Foundations of System Safety Engineering: A Road Map for the Future
This graduate-level textbook elucidates low-risk and fail-safe systems in mathematical detail.  It addresses, in particular, problems where mission-critical performance is paramount, such as in aircraft, missiles, nuclear reactors and weapons, submarines, and many other types of systems where “failure” can result in...
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications
Just fifteen years ago, the Web was as simple as it was unimportant: a quirky mechanism that allowed a handful of students, plus a bunch of asocial, basementdwelling geeks, to visit each other’s home pages dedicated to science, pets, or poetry. Today, it is the platform of choice for writing...
Beginning Haskell: A Project-Based Approach
Beginning Haskell: A Project-Based Approach

Beginning Haskell provides a broad-based introduction to the Haskell language, its libraries and environment, and to the functional programming paradigm that is fast growing in importance in the software industry. The book takes a project-based approach to learning the language that is unified around the building of a web-based...

Arctic Offshore Engineering
Arctic Offshore Engineering

There is an increasing need to construct engineering structures in the Arctic seas. The requirement is principally generated by the oil and gas industry, because of the substantial reserves that are known to exist offshore in the Beaufort Sea, the Caspian Sea, the Barents Sea, the Pacific Ocean off the coast of Sakhalin, the Canadian Arctic,...

Internet Simplified
Internet Simplified
The content boom on the Internet has been explosive in the past few years with more than a billion people surfing worldwide. Internet Simplified shows beginning level computer users how to get comfortable surfing the web and how to navigate the flood of information once they find what they're looking for. Users will find helpful information on the...
Top-Down Network Design (3rd Edition)
Top-Down Network Design (3rd Edition)

The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic...

Well Engineering and Construction
Well Engineering and Construction

This book  will present the origins of pore pressure and principles its determination. It should be emphasized here that this subject alone requires more than one book to cover in detail.

Hence the emphasis will be placed on the practical utilisation of pore pressure in the well planning process. It is hoped that the...

Caution! Wireless Networking: Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
Sure you’re vulnerable.
Now here’s what you do about it

Calm down. There are definite dangers associated with wireless networking, but you hold the antidote in your hands. This guide, written by a respected security consultant, separates the genuine threats from the hype and hysteria. Then it tells you how to guard...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy