Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Keynote Fast & Easy
Keynote Fast & Easy
Keynote is a presentation graphics program created by Apple. With Keynote, you
can create and deliver impressive slideshows, even if you are not a computer whiz.
And because Keynote costs only $99—a steal for a business computing application
these days—the program makes it affordable for professionals in all
...
Brute Force: Cracking the Data Encryption Standard
Brute Force: Cracking the Data Encryption Standard
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved...
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Webster's New World Hacker Dictionary
Webster's New World Hacker Dictionary
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace.

Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.

Cyberspace has a language all its own. Understanding it is vital
...
Steal This File Sharing Book
Steal This File Sharing Book

Steal This File Sharing Book tackles the thorny issue of file sharing, explaining how file sharing networks work and how to use them safely and effectively. There’s a wealth of free material available online—music, movies books, software, video games, even pornography. But do you know where to find that rare song...

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

A Cup of Comfort for Cat Lovers: Stories that celebrate our feline friends
A Cup of Comfort for Cat Lovers: Stories that celebrate our feline friends

You know much joy your furry friend adds to your life and in this stunning new collection you'll find fifty more cats that will steal your heart-one meow at a time.

From a wayward Calico that rescues his family from a deadly snake to a sophisticated Siamese that helps to heal her ailing owner, A Cup of Comfort for Cat...

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Oracle 11g Anti-Hacker's Cookbook
Oracle 11g Anti-Hacker's Cookbook
When I first became aware of Adrian Neagu's intent to author a book on Oracle security, I sent him a congratulatory note. This is an important subject area, and I felt a special need to pass on my best wishes. His first book IBM DB2 9.7 Advanced Administration Cookbook, Packt Publishing, had a chapter devoted to database...
Secrets of the Playstation Portable
Secrets of the Playstation Portable
With over 13 million shipped, the Sony PlayStation Portable, or PSP, is one of the fastest selling game consoles in history. In this essential guide, gaming expert Joel Durham, Jr. shows readers how to get the most out of this revolutionary handheld game console. After an initial tour around the interface, Joel will introduce the readers to the...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy