Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking For Dummies (Computer/Tech)
Hacking For Dummies (Computer/Tech)
Welcome to Hacking For Dummies, 2nd Edition. This book outlines — in plain English — computer hacker tricks and techniques that you can use to assess the security of your own information systems, find security vulnerabilities, and fix the weaknesses before criminal hackers and rogue insiders have an opportunity to take advantage of...
Microsoft SharePoint 2010 Enterprise Applications on Windows Phone 7
Microsoft SharePoint 2010 Enterprise Applications on Windows Phone 7

In 2009, Microsoft Chairman Bill Gates announced the company's leading web application platform for organizations, SharePoint, has exceeded 1 billion dollars in profits with over 100 million licenses sold. I was in the audience when he said that and couldn't help but reflect on how far SharePoint has come in less than a decade. In the...

Learning Web Design: A Beginner's Guide to HTML, CSS, JavaScript, and Web Graphics
Learning Web Design: A Beginner's Guide to HTML, CSS, JavaScript, and Web Graphics
Hello and welcome to the fourth edition of Learning Web Design.

So much has happened since the previous edition! Just when it looked like things were beginning to settle down with the adoption of web standards by the browser creators and the development community, along comes the “Mobile
...
Fundamentals of Radar Signal Processing
Fundamentals of Radar Signal Processing
The goal of this book is to provide in-depth coverage of fundamental topics in radar signal processing from a digital signal processing perspective. The tech- niques of linear systems, filtering, sampling, and Fourier analysis techniques and interpretations are used throughout to provide a modern and unified tuto- rial approach....
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking...

Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement...

Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Organic Synthesis Workbook II (No.2)
Organic Synthesis Workbook II (No.2)

Regular practice makes perfect - and this is equally true of organic synthesis. Only the numerous and constantly new little tricks and tips make for elegant synthesis. Knowledge of synthesis methods, reactivities, reagents, protective groups and much more is best acquired - and retained - by way of detailed analysis and processing of complex...

MCTS: Windows Server 2008 Network Infrastructure Configuration Study Guide: Exam 70-642
MCTS: Windows Server 2008 Network Infrastructure Configuration Study Guide: Exam 70-642
Microsoft has recently changed its certification program to contain three primary series: Technology, Professional, and Architect. The Technology Series is intended to allow candidates to target specific technologies and is the basis for obtaining the Professional Series and Architect Series of certifications. The certifications...
Mass Spectrometry in Medicinal Chemistry: Applications in Drug Discovery, Volume 36 (Methods and Principles in Medicinal Chemistry)
Mass Spectrometry in Medicinal Chemistry: Applications in Drug Discovery, Volume 36 (Methods and Principles in Medicinal Chemistry)

This first overview of mass spectrometry-based pharmaceutical analysis is the key to improved high-throughput drug screening, rational drug design and analysis of multiple ligand-target interactions. The ready reference opens with a general introduction to the use of mass spectrometry in pharmaceutical screening, followed by a detailed...

Gideros Mobile Game Development
Gideros Mobile Game Development

With Gideros you can develop games for both iOS and Android faster and more simply. This book shows you how with a real-life project you undertake yourself. All that's required is a little familiarity with Lua.

Overview

  • Develop engaging iOS and Android mobile games quickly and efficiently
  • ...
Major Donors: Finding Big Gifts in Your Database and Online
Major Donors: Finding Big Gifts in Your Database and Online

A winning approach to developing international fundraising strategies

Philanthropy is in a renewed golden age. People want to help, to make a difference, to ensure that the things they value will flourish. In order to capitalize on potential prospects, many nonprofit professionals focus solely on the research of, or communication with,...

unlimited object storage image
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy