Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management

An important aspect of managing human capital in the 21st century workplace is managing the interface between humans and information technology, particularly the World Wide Web. The Web has changed not only how and where business is conducted, but also how and where work is done. Personal web usage has created many desirable organizational...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

A Transition to Abstract Mathematics, Second Edition: Learning Mathematical Thinking and Writing
A Transition to Abstract Mathematics, Second Edition: Learning Mathematical Thinking and Writing
This second edition assists engineering and physical science students on fundamental proof techniques and learning to think and write mathematics

Constructing concise and correct proofs is one of the most challenging aspects of learning to work with advanced mathematics. Meeting this challenge is a defining moment for those
...
Clear Leadership: Sustaining Real Collaboration and Partnership at Work
Clear Leadership: Sustaining Real Collaboration and Partnership at Work
All over the world we are witnessing a revolution in organizing. Just as the industrial revolution created its new form of organization (bureaucracy), the information revolution is creating its own new form of organization. We are moving from command and control to collaboration, from organizing based on a few leaders telling...
Schaum's Outline of Visual Basic
Schaum's Outline of Visual Basic
Master the fundamentals of Visual Basic with Schaum's­­the high-performance study guide. It will help you cut study time, hone problem-solving skills, and achieve your personal best on exams and projects!

Students love Schaum's Outlines because they produce results. Each year, hundreds of thousands of students improve their test scores...

Cryptography and Security Services: Mechanisms and Applications
Cryptography and Security Services: Mechanisms and Applications
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and...
Ants, Bikes, and Clocks: Problem Solving for Undergraduates
Ants, Bikes, and Clocks: Problem Solving for Undergraduates
Mathematics educators agree that problem solving is one of the essential skills their students should possess, yet few mathematics courses or textbooks are devoted entirely to developing this skill. Supported by narrative, examples, and exercises, Ants, Bikes, and Clocks: Problem Solving for Undergraduates is a readable and enjoyable text designed...
Handbook of Educational Data Mining (CRC Data Mining and Knowledge Discovery Series)
Handbook of Educational Data Mining (CRC Data Mining and Knowledge Discovery Series)

The goal of this book is to provide an overview of the current state of knowledge of educational data mining (EDM). The primary goal of EDM is to use large-scale educational data sets to better understand learning and to provide information about the learning process. Although researchers have been studying human learning for over a...

Outsource It!: A No-Holds-Barred Look at the Good, the Bad, and the Ugly of Offshoring Tech Projects
Outsource It!: A No-Holds-Barred Look at the Good, the Bad, and the Ugly of Offshoring Tech Projects

If you need to expand your business but not your budget, if your group has an intense but short-term project, if you don't have the skill set to get a job done-it's time to think about outsourcing. Starting from the first step (should you outsource part of your tech work?) to the last (how can you protect your intellectual...

Learn JavaScript with p5.js: Coding for Visual Learners
Learn JavaScript with p5.js: Coding for Visual Learners
Learn coding from scratch in a highly engaging and visual manner using the vastly popular JavaScript with the programming library p5.js. The skills you will acquire from this book are highly transferable to a myriad of industries and can be used towards building web applications, programmable robots, or generative art. 
...
A+ Certification Exam Cram 2 (Exam Cram 220-301, Exam Cram 220-302), Second Edition
A+ Certification Exam Cram 2 (Exam Cram 220-301, Exam Cram 220-302), Second Edition

A+ Exam Cram 2 is a study skill enhancement and tutorial, designed to focus on exactly what students need to get A+ certified, with coverage of exams 220-221 and 220-222. It details all the new exam objectives and items in the following areas: Windows 98, Windows 2000, and Windows NT version 4.0. Because the A+ certification is a core competency...

unlimited object storage image
Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy