Home | Amazing | Today | Tags | Publishers | Years | Search 
Starting an Online Business All-in-One For Dummies (For Dummies (Business & Personal Finance))
Starting an Online Business All-in-One For Dummies (For Dummies (Business & Personal Finance))

Start a successful online business—and be your own boss!

Being an online entrepreneur means more than just building a website—and this book breaks down everything you need to know to be successful. Inside, you'll get plain-English explanations and easy-to-follow instruction on online business basics, legal...

Hacking Exposed 7: Network Security Secrets and Solutions
Hacking Exposed 7: Network Security Secrets and Solutions

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...

Visual and Spatial Analysis: Advances in Data Mining, Reasoning, and Problem Solving
Visual and Spatial Analysis: Advances in Data Mining, Reasoning, and Problem Solving

Advanced visual analysis and problem solving has been conducted successfully for millennia. The Pythagorean Theorem was proven using visual means more than 2000 years ago. In the 19th century, John Snow stopped a cholera epidemic in London by proposing that a specific water pump be shut down. He discovered that pump by visually correlating...

Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)
Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series)

If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re at greater risk...

Computers Under Attack: Intruders, Worms and Viruses
Computers Under Attack: Intruders, Worms and Viruses

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The...

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

The thrilling memoir of the world's most wanted computer hacker

"Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed
...

The Log Cabin Book: A Complete Builder's Guide to Small Homes and Shelters
The Log Cabin Book: A Complete Builder's Guide to Small Homes and Shelters

This vintage guide from over a century ago offers timeless, practical advice on building log cabins. Plans and directions for simple structures are easy enough for amateurs to follow; time and inclination are the only necessary elements. Each of the designs has been tested and allows numberless alterations to suit the builder's tastes and...

Introductory Chemistry: An Atoms First Approach
Introductory Chemistry: An Atoms First Approach

From its very origin, Introductory Chemistry: An Atoms First Approach by Julia Burdge and Michelle Driessen has been developed and written using an atoms‐first approach specific to introductory chemistry. It is not a pared down version of a general chemistry text, but carefully crafted with the introductory‐chemistry student...

DevOps Troubleshooting: Linux Server Best Practices
DevOps Troubleshooting: Linux Server Best Practices

“If you’re a developer trying to figure out why your application is not responding at 3 am, you need this book! This is now my go-to book when diagnosing production issues. It has saved me hours in troubleshooting complicated operations problems.”

Trotter Cashion,...

A Fast Track to Structured Finance Modeling, Monitoring, and Valuation: Jump Start VBA
A Fast Track to Structured Finance Modeling, Monitoring, and Valuation: Jump Start VBA

This book is designed to start with simple examples that progressively develop the reader's confidence to take on more complex tasks. There is very little theoretical discussion about computer science, operations research algorithms, mathematics, or finance. The thrust of the book is to teach the reader to break complex tasks down into...

99 Tricks and Traps for Microsoft Project 2013 and 2016
99 Tricks and Traps for Microsoft Project 2013 and 2016

The casual users survival guide! For users who understand the basics and want a brief text to demonstrate the less intuitive functions. The book is aimed at Project Management Professionals who are casual or new users and understand the software basics but require a short and snappy guide. It is the sort of book that may be read without a...

PICmicro MCU C: An introduction to Programming the Microchip PIC in CCS C
PICmicro MCU C: An introduction to Programming the Microchip PIC in CCS C
The C language was development at Bell Labs in the early 1970’s by Dennis Ritchie and Brian Kernighan. One of the first platforms for implementation was the PDP-11 running under a UNIX environment. Since its introduction, it has evolved and been standardized throughout the computing industry as an established development...
Result Page: 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy