Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

The Secret History of the World: And How to Get Out Alive
The Secret History of the World: And How to Get Out Alive
I suspected something was wrong with the “facts of life” as they were presented to me when I was a kid. Sure, I then spent a little over thirty years trying to be “normal” and make that square peg fit the round hole, “looking for a reason to believe.” But then there was a memorable day when I finally grew up and...
Learning Quartz Composer: A Hands-On Guide to Creating Motion Graphics with Quartz Composer
Learning Quartz Composer: A Hands-On Guide to Creating Motion Graphics with Quartz Composer

 

Welcome to Learning Quartz Composer! We guarantee this will be the most fun geek book you have read, and by the end your digital world will be a better-looking place. Whether you dream of live visuals, interactive installations, Cocoa apps, dashboard widgets, or extra awesomeness for your film and motion...

Fault Analysis in Cryptography (Information Security and Cryptography)
Fault Analysis in Cryptography (Information Security and Cryptography)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...

Object-Oriented Programming with Visual Basic .NET
Object-Oriented Programming with Visual Basic .NET

This book is not a reference. That needs to be said right off the bat. It was written to be read cover to cover; it tells a story. It's an interwoven tale about object-oriented programming in the .NET world: building objects, moving them, and using them around the world. This is not just a how-to book; it's a why-to and a when-to...

iPhone 4 Made Simple
iPhone 4 Made Simple

Congratulations—you’ve purchased the new iPhone 4, the coolest smartphone on the market. Now it’s time to learn how to take advantage of all the features, apps, and secret techniques available. To accomplish this, look no further than iPhone 4 Made Simple. Over 1,000 screen visuals and clear-cut instructions guide...

A Practical Guide to Information Architecture (Practical Guide Series)
A Practical Guide to Information Architecture (Practical Guide Series)

I’ll tell you a secret. One that my friends and family mostly know about, and many people who meet me eventually figure out. But it is one of those slightly embarrassing secrets – one that I don’t usually just tell people when I meet them for the first time. But you’re going to be my friend for the next 300 pages, so...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Magic Is Dead: My Journey into the World's Most Secretive Society of Magicians
Magic Is Dead: My Journey into the World's Most Secretive Society of Magicians

In the vein of Neil Strauss’ The Game and Joshua Foer’s Moonwalking with Einstein comes the fascinating story of one man’s colorful, mysterious, and personal journey into the world of magic, and his unlikely invitation into an underground secret society of revolutionary magicians from...

Agility by ARIS Business Process Management: Yearbook Business Process Excellence 2006/2007
Agility by ARIS Business Process Management: Yearbook Business Process Excellence 2006/2007
Agility and Execution – Organizational Success Through Flexible Business Processes

Only a company which is flexible, agile and responsive will be successful. The secret to success is agility, meaning the ability to quickly adapt company processes. Against this backdrop, IT is of particular importance as it is virtually the machine
...
The Coaching Secret: How to be an exceptional coach
The Coaching Secret: How to be an exceptional coach

Coaching as a field has mushroomed in recent years. Thousands of new coaches enter the field after only completing short and superficial training programmes. The problem with this is that coaching is not i) something you can simply learn in a short programme ii) a superficial practice.

The books available on coaching tend to just...

Dynamic Secrets in Communication Security
Dynamic Secrets in Communication Security

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy