Home | Amazing | Today | Tags | Publishers | Years | Search 
Just Doing My Job: Stories of Service from World War II
Just Doing My Job: Stories of Service from World War II
Preserving the personal histories of civilians and soldiers who united to defend America during the Second World War, this oral history tells the stories of ordinary citizens who left jobs and families behind to contribute to the war effort. Chronicling the sacrifices made by otherwise average people, this...
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations...

Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Bulletproof your organization against data breach, identity theft, and corporate espionage

In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...

Getting Started with .NET Gadgeteer (Make: Projects)
Getting Started with .NET Gadgeteer (Make: Projects)
.NET Gadgeteer is a wonderful system for constructing prototypes of electronic gadgets. It is supported by a range of modules that are connected to a Mainboard with plug-in cables.

This book will lead you through the process of installing the necessary software onto your computer and then take
...
Practical Lock Picking: A Physical Penetration Tester's Training Guide
Practical Lock Picking: A Physical Penetration Tester's Training Guide
I feel somewhat like an old man remarking in this fashion, but this book is a great example of the wonderful time in which you currently find yourself. To be alive and learning right now—when there are accessible resources such as this about lockpicking, with beautiful illustrations and lessons written with passion visible on...
Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

Microsoft Windows Home Server 2011 Unleashed (3rd Edition)
Microsoft Windows Home Server 2011 Unleashed (3rd Edition)

Covers the newest version of WHS!

 

This is the most comprehensive, practical, and useful guide to the brand-new version of Windows Home Server 2011. Paul McFedries doesn’t just cover all facets of running Windows Home Server: He shows how to use it...

Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20

Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.”

The theme of our deliberations this...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

SOA and Web Services Interface Design: Principles, Techniques, and Standards (The MK/OMG Press)
SOA and Web Services Interface Design: Principles, Techniques, and Standards (The MK/OMG Press)
With the introduction of increasingly complex Web services over the last decade, there has been an explosion of interest in service-oriented architecture (SOA), a structural style whose goal is to achieve a coupling of interacting services - functionalities such as filling out an online application for an account, viewing an online bank statement,...
For Crying Out Loud: From Open Outcry to the Electronic Screen
For Crying Out Loud: From Open Outcry to the Electronic Screen

In Praise of For Crying Out Loud

"Endowed with strong parents and a bit of luck, Leo Melamed has made a remarkable escape from Nazi occupied Poland to building one of the pinnacles of global finance. Over four decades and more, he was the leading force in bringing his beloved 'Merc' from obscure trading pits for butter...

Excel 2010 Simplified
Excel 2010 Simplified

Get going with Excel 2010 quickly and easily with this Simplified guide

Excel can be a complex program, and Excel 2010 includes new features and functionalities that require users of older versions to re-learn the application. Whether you're switching from an earlier version or learning Excel for the first time,...

Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy