Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)
Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)

If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re at greater risk...

Turing (A Novel about Computation)
Turing (A Novel about Computation)
Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a...
Excel 2013 Bible
Excel 2013 Bible

Excel at Excel with the help of this bestselling spreadsheet guide

John Walkenbach's name is synonymous with excellence in computer books that decipher the complexities of Microsoft Excel. Known as "Mr. Spreadsheet," Walkenbach shows you how to maximize the power of Excel 2013 while bringing you up to speed on...

Professional XML (Programmer to Programmer)
Professional XML (Programmer to Programmer)

From document type definitions and XQuery to Web services and form development, this book takes you through all of the XML capabilities that companies want to implement today. It not only covers the basics of XML and the XML specification, but also shows you the XML-based applications that are driving the tech industry forward, such as blogging...

Wireless Sensor Networks: Technology, Protocols, and Applications
Wireless Sensor Networks: Technology, Protocols, and Applications
Infrastructure for Homeland Security Environments

Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way...

Microsoft System Center: Configuration Manager Field Experience (Introducing)
Microsoft System Center: Configuration Manager Field Experience (Introducing)

Part of a series of specialized guides on System Center - this book shares real-world expertise for using Configuration Manager capabilities to deliver more effective IT services. Series editor Mitch Tulloch and a team of System Center experts provide concise technical guidance as they step you through key deployment and management...

How to Persuade People Who Don't Want to be Persuaded: Get What You Want-Every Time!
How to Persuade People Who Don't Want to be Persuaded: Get What You Want-Every Time!
If you’re in business, you’re selling something–a product, an opinion, a new way of doing things. The truth is, even if you don’t think of yourself as a pitchman, you might as well be one. This powerful guide to ethical influence shows you how to use effective persuasion techniques to get what you want the right...
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security"
—Tom Parker, Computer Security Analyst and founder of Global
...
Trustworthy Compilers (Quantitative Software Engineering Series)
Trustworthy Compilers (Quantitative Software Engineering Series)

The Most Complete, Real-World Guide to Compiler

Development—and the Principles of Trustworthy Compilers

Drawing on the author's over thirty years of expertise in compiler development, research, and instruction, Trustworthy Compilers introduces and analyzes the concept of trustworthy compilers and the principles...

Data Scientists at Work
Data Scientists at Work

Data Scientists at Work is a collection of interviews with sixteen of the world's most influential and innovative data scientists from across the spectrum of this hot new profession. "Data scientist is the sexiest job in the 21st century," according to the Harvard Business Review. By 2018, the United States will...

eBay Business All-in-One For Dummies (For Dummies (Business & Personal Finance))
eBay Business All-in-One For Dummies (For Dummies (Business & Personal Finance))

The selling, marketing, and business tips you need to succeed

eBay is the perfect place to learn the ropes of what it's like running an online business. It provides the tools, technology, and platform a would-be entrepreneur needs to launch their first successful small business. It takes some know-how, however, to get...
CCNP TSHOOT 642-832 Official Certification Guide
CCNP TSHOOT 642-832 Official Certification Guide

CCNP TSHOOT 642-832 Official Certification Guide is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the CCNP® TSHOOT exam. Senior instructor and best-selling author Kevin Wallace shares preparation hints and test-taking tips, helping you identify areas of weakness and...

Result Page: 34 33 32 31 30 29 28 27 26 25 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy