Home | Amazing | Today | Tags | Publishers | Years | Search 
Building Internet Firewalls
Building Internet Firewalls

More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images.Everyone is jumping on the Internet bandwagon. Once a...

Build a Profitable Online Business: The No-Nonsense Guide (Expert's Voice in E-Commerce)
Build a Profitable Online Business: The No-Nonsense Guide (Expert's Voice in E-Commerce)

Build a Profitable Online Business: The No Nonsense Guide is a highly condensed step-by-step guide on how to build and run profitable websites.

Serial web entrepreneur Mikael Olsson gives you in a nutshell all the tools, tips, and savvy you’ll need to create and operate online businesses that will...

Turn Clicks Into Customers: Proven Marketing Techniques for Converting Online Traffic into Revenue
Turn Clicks Into Customers: Proven Marketing Techniques for Converting Online Traffic into Revenue

Turn online visitors into paying customers!

You’ve gone through all steps of developing a powerful business presence on the Web-—but it’s only the first step. Now, you have to make sure your visitors hit the “Purchase” button . . . before they start clicking through to your...

Soft Landing: Airline Industry Strategy, Service, and Safety
Soft Landing: Airline Industry Strategy, Service, and Safety

Soft Landing: Airline Industry Strategy, Service, and Safety covers the immediate past, present, and future of the airline industry and its effects on consumers and the economy. 

Aviation receives a disproportionate amount of news coverage in the popular press—not to mention chatter at cocktail parties and...

Magento Site Performance Optimization
Magento Site Performance Optimization

Leverage the power of Magento to speed up your website

About This Book

  • Improve the performance of Magento by more than 70%
  • Master Magento caching techniques
  • Using a step-by-step approach, learn how to optimize Magento site performance

Who This Book Is...

Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...

Vision-based Pedestrian Protection Systems for Intelligent Vehicles (SpringerBriefs in Computer Science)
Vision-based Pedestrian Protection Systems for Intelligent Vehicles (SpringerBriefs in Computer Science)

Pedestrian Protection Systems (PPSs) are on-board systems aimed at detecting and tracking people in the surroundings of a vehicle in order to avoid potentially dangerous situations. These systems, together with other Advanced Driver Assistance Systems (ADAS) such as lane departure warning or adaptive cruise control, are one of the most...

Getting Started with Flurry Analytics
Getting Started with Flurry Analytics

In today's mobile app market you need to track your applications and analyze user data to give yourself the competitive edge. Flurry Analytics will do all that and more, and this book is the perfect developer's guide.

Overview

  • Analyze collective data using Flurry analytics to improve monetization...
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Inbound Marketing For Dummies
Inbound Marketing For Dummies

Don't chase business—bring new customers to you!

Outdated sales tactics have you chasing leads and fishing for new business. In today's competitive world, nobody has time for that! Inbound Marketing For Dummies is a one-stop-shop for everything you need to know about inbound marketing techniques that...

CompTIA Network+ N10-006 Cert Guide
CompTIA Network+ N10-006 Cert Guide

This approved study guide helps you master topics on the CompTIA Network+ N10-006 exam, including the following:

  •  Computer network fundamentals
  • The OSI model and TCP/IP stack
  • ...
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy