Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
What Is HTML5?
What Is HTML5?

HTML5: Everyone’s using it, nobody knows what it is. I realize that sounds more like a line out of an existential movie — maybe Waiting for Godot or a screenplay by Sartre — than a statement about HTML5. But it’s really...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
The Discipline of Organizing: Professional Edition, 3rd Edition
The Discipline of Organizing: Professional Edition, 3rd Edition

This ebook exploits many advanced capabilities with images, hypertext, and interactivity and is optimized for EPUB3-compliant book readers, especially Apple's iBooks and browser plugins. These features may not work on all ebook readers.

...
4G: Deployment Strategies and Operational Implications
4G: Deployment Strategies and Operational Implications

Specific operational requirements drive early network architectural and design decisions for 4G networks. 4G: Deployment Strategies and Operational Implications evaluates the specific design and deployment options and strategies for LTE network business development. LTE is a...

Preventing Web Attacks with Apache
Preventing Web Attacks with Apache

The only end-to-end guide to securing Apache Web servers and Web applications

Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications....

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Beginning HTML5 Games with CreateJS
Beginning HTML5 Games with CreateJS

Beginning HTML5 Games with CreateJS provides a hands-on approach to get you up and running with the most comprehensive tools available for HTML5 Canvas game development. Whether you are brand new to...

HIPAA Security Implementation Version 1.0 (SANS Step-by-Step Series)
HIPAA Security Implementation Version 1.0 (SANS Step-by-Step Series)

Written for the IT staff in hospitals, this guide provides step-by-step direction on how to apply the required and addressable HIPAA Security implementation specifications into a comprehensive solution.

A “consensus project” of numerous computer security experts has culminated in a Guide for...

Windows Forensic Analysis DVD Toolkit, Second Edition
Windows Forensic Analysis DVD Toolkit, Second Edition

"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis."
-Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer

"The Registry Analysis chapter alone is worth the price of the book."
-Troy Larson, Senior
...

Practical Software Development Techniques: Tools and Techniques for Building Enterprise Software
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
iOS UICollectionView: The Complete Guide (2nd Edition) (Mobile Programming)
iOS UICollectionView: The Complete Guide (2nd Edition) (Mobile Programming)

Fully updated for iOS 7, iOS UICollectionView: The Complete Guide, Second Edition will help you build highly immersive, cutting-edge iOS user interfaces that transform your apps from good to great! Ash Furrow...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy