Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Mac OS X Leopard Bible
Mac OS X Leopard Bible
Get up to speed on Mac OS X Leopard with this in-depth guide

The beauty of Leopard is that there is so much more than meets the eye, including over 300 new enhancements and its ability to run on both Intel PCs and PowerPC Macs. This comprehensive reference is your best guide on how to tame this powerful new cat. You'll find...

The Little Black Book of Project Management
The Little Black Book of Project Management
This Little Black Book shows you how to take charge of a big project, define it, and then break it down into
smaller, more manageable phases. You will learn how to control a budget and schedule and lead a project
team through to successful completion. You will find out how to anticipate problems and plan for them during
the various
...
Decrypted Secrets: Methods and Maxims of Cryptology
Decrypted Secrets: Methods and Maxims of Cryptology
"The best single book on cryptology today." --Cryptologia (from a review of a previous edition)

"It is an outstanding book that assumes only elementary mathematical knowledge and is interspersed with many exciting, amusing, and sometimes personal stories from the history of cryptology."
...
Trade Like Jesse Livermore (Wiley Trading)
Trade Like Jesse Livermore (Wiley Trading)
The secret to Jesse Livermore’s legendary trading success
Although he began his career in 1892, Jesse Livermore is still considered to be one of the world’s greatest traders. In life and in death, Livermore has always been a controversial figure and his methods held up as a model for traders of all generations. Through 45 years
...
Autodesk Smoke Essentials: Autodesk Official Press
Autodesk Smoke Essentials: Autodesk Official Press
When I started pre-production on the movie that served as the inspiration for this book, I was, like you, vaguely familiar with Smoke and curious about what its integrated capabilities could bring to my workfl ow. And like you, I was new to its ways — just a raw recruit. Over the course of editing my fi lm and participating...
Let Us C
Let Us C
It is mid 2004. World has left begind the DOTCOM bust, 9/11 tragedy, the economic downturn, etc. and moved on. Countless Indians have relentlessly worked for close two decades to successfully establish "India" as a software brand. At times I take secret pleasure in seeing that a book that I have been part of, has contributed in its own...
Super Trader: Make Consistent Profits in Good and Bad Markets
Super Trader: Make Consistent Profits in Good and Bad Markets

How do you transform yourself from mild-mannered investor to Super Trader? Think clearly. Plan accordingly. Commit completely. In other words, become a trader. And no one is better suited to help you make the transformation than legendary trading educator and author Van K. Tharp.

Combining the sharp insight and technical...

Coding Projects in Python
Coding Projects in Python

Using fun graphics and easy-to-follow instructions, this straightforward, this visual guide shows young learners how to build their own computer projects using Python, an easy yet powerful free programming language available for download.

Perfect for kids ages 10 and over who are ready to take a second step after Scratch, Coding...

Fundamentals of Computer Security
Fundamentals of Computer Security

This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key...

Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary is your full reference resource for all things cryptography.

Cryptography from A5/0 to ZRTP
 
Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for
...
Physical Layer Security in Wireless Communications (Wireless Networks and Mobile Communications)
Physical Layer Security in Wireless Communications (Wireless Networks and Mobile Communications)

Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy