Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Baby Boomers and Hearing Loss: A Guide to Prevention and Care
Baby Boomers and Hearing Loss: A Guide to Prevention and Care

In Baby Boomers and Hearing Loss, audiologist John Burkey shows readers how they can continue to enjoy youthful living, regardless of whether their hearing abilities are undiminished or severely compromised. In a reassuring and straightforward style, Burkey explains the typical causes of hearing loss, from genetic factors to...

iMovie 6 & IDVD : The Missing Manual
iMovie 6 & IDVD : The Missing Manual

While the last version of iMovie gave moviemakers the ability to capture and edit widescreen High Definition Video (HDV) from the new generation of camcorders, iMovie 6 is all about the ease of moviemaking itself. iMovie 6 includes five professionally designed themes with backgrounds, motion graphics, titles, and effects that...

The Game Maker's Apprentice: Game Development for Beginners
The Game Maker's Apprentice: Game Development for Beginners

The Game Maker's Apprentice shows you how to create nine exciting games using the wildly popular Game Maker game creation tool. This book covers a range of genres, including action, adventure, and puzzle games--complete with professional quality sound effects and visuals. It discusses game design theory and features practical examples...

AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Water and the Future of Humanity: Revisiting Water Security
Water and the Future of Humanity: Revisiting Water Security

This unique, engaging, and highly authoritative volume enlightens readers on changes needed in the way society accesses, provides, and uses water. It further shines a light on changes needed in the way we use food, energy, and other goods and services in relation to water, and offers projections and recommendations, up to 2050, that apply to...

Deep Learning: Practical Neural Networks with Java
Deep Learning: Practical Neural Networks with Java

Build and run intelligent applications by leveraging key Java machine learning libraries

About This Book

  • Develop a sound strategy to solve predictive modelling problems using the most popular machine learning Java libraries.
  • Explore a broad variety of data processing, machine learning,...
Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

Running Linux, Fourth Edition
Running Linux, Fourth Edition
This is a book about Linux, a free, open source operating system that's changing the world of
computing. In this book, we show how you can completely change the way you work with
computers by exploring a powerful and free operating system. Linux goes against
the traditional computing mainstream, being developed by a loosely organized
...
Beginning C# 2005 Databases: From Novice to Professional
Beginning C# 2005 Databases: From Novice to Professional

Beginning C# 2005 Databases: From Novice to Professional teaches you everything you need to know about relational databases, the SQL database language, and ADO.NET 2.0. You'll also get a sound start in developing console, Windows Forms, ASP.NET, and even XML database applications.

This book also teaches you database...

Effective Computational Methods for Wave Propagation (Numerical Insights)
Effective Computational Methods for Wave Propagation (Numerical Insights)
Due to the increase in computational power and new discoveries in propagation phenomena for linear and nonlinear waves, the area of computational wave propagation has become more significant in recent years. Exploring the latest developments in the field, Effective Computational Methods for Wave Propagation presents several modern,...
Real-World Flash Game Development: How to Follow Best Practices AND Keep Your Sanity
Real-World Flash Game Development: How to Follow Best Practices AND Keep Your Sanity

This book covers Flash for the everyday developer. The average Flash developer doesn't have luxurious timelines, employers who understand the value of reusability, or the help of an information architect to design a usable experience. This book helps bridge the gap for these coders who may be used to C++, Java, or C# and want to move over...

unlimited object storage image
Result Page: 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy