Home | Amazing | Today | Tags | Publishers | Years | Search 
Out of Character: Surprising Truths About the Liar, Cheat, Sinner (and Saint) Lurking in All of Us
Out of Character: Surprising Truths About the Liar, Cheat, Sinner (and Saint) Lurking in All of Us

Have you ever wondered why a trumpeter of family values would suddenly turn around and cheat on his wife? Why jealousy would send an otherwise level-headed person into a violent rage? What could drive a person to blow a family fortune at the blackjack tables?
 
Or have you ever pondered what might make Mr. Right leave his
...

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
Mission-Critical Security Planner: When Hackers Won't Take No for an Answer
Mission-Critical Security Planner: When Hackers Won't Take No for an Answer
All the worksheets and templates you need to create a complete customized security plan that works for your business

Let’s face it: Security is a business problem, not just a technical challenge. Whether hackers simply want to test their skills or steal your data, they can–and will–do incalculable damage to your company. You...

Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
Visual Basic 2005 Express: Now Playing
Visual Basic 2005 Express: Now Playing
Dot Net Expertise, May 7, 2006
"It is very well illustrated; a big plus for a beginner's book."

DesktopEngineer.com, April 14, 2006
"Good layout which takes the learner through practical examples
...
Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement...

Inside the Spam Cartel
Inside the Spam Cartel

Since the explosion of Internet users during the late 1990’s, the unending spam scourge has shown no sign of abating. Statistics from large anti-spam companies that monitor millions of e-mails per hour show that the rates are actually still going up, and depending who you listen to, they are now rising between 50 and...

C++ Timesaving Techniques For Dummies
C++ Timesaving Techniques For Dummies

C++ is a flexible, powerful programming language with hundreds of
thousands of applications. However, the knowledge of how to take
advantage of its full potential comes only with time and experience.
That’s where this book comes in. Think of it as a “cookbook” for solving
your programming
...

The Myth of Leadership : Creating Leaderless Organizations
The Myth of Leadership : Creating Leaderless Organizations
In this unconventional, thought-provoking text, Jeffrey Nielsen debunks leader-based corporate hierarchies and presents the paradigm of "peer-based" organizations.

Can we really run organizations without leaders? Yes, says organizational consultant Jeffrey Nielsen in this provocative book. According to Nielsen, it’s time...

PC Magazine Windows XP Security Solutions
PC Magazine Windows XP Security Solutions
Think you're safe?

Guess what?

Studies have estimated that up to 90 percent of computers are infected by some security threat or another. There's a good chance yours is among them, but any computer can be easily secured to a high level-if you know what you're doing.

They're out there. Trust PC Magazine to...

Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy