|
|
|
Hacking Exposed 7: Network Security Secrets and Solutions
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the... | | Amazon Web Services for Mobile Developers: Building Apps with AWS
A practical, real-world introduction to AWS tools and concepts
Amazon Web Services for Mobile Developers: Building Apps with AWS presents a professional view of cloud computing and AWS for experienced iOS/Android developers and technical/solution architects. Cloud computing is a rapidly expanding ecosystem, and... | | Labor in America: A History
The contours and content of this book have evolved in response to the experiences of
American workers and their organizations as they have played out over the course of
the last 70 years. When Foster Rhea Dulles began drafting the first edition of this
textbook after World War II, the American labor movement was ascendant, benefiting... |
|
|
Learning Pixelmator
Enhance your photos effectively and unleash the artist inside, with Pixelmator
Overview
-
Learn how to use Pixelmator and its primary tools.
-
Discover how to edit your photos using real world examples.
-
Use the Effect tools and artistically enhance your images.
... | | Nonlinear Estimation and Control of Automotive Drivetrains
Nonlinear Estimation and Control of Automotive Drivetrains discusses the control problems involved in automotive drivetrains, particularly in hydraulic Automatic Transmission (AT), Dual Clutch Transmission (DCT) and Automated Manual Transmission (AMT). Challenging estimation and control problems, such as driveline torque estimation and... | | Introduction to Information Security: A Strategic-Based Approach
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical... |
|
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 |