Home | Amazing | Today | Tags | Publishers | Years | Search 
Disaster Recovery (EC-Council Disaster Recovery Professional)
Disaster Recovery (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Guide to Networking Essentials, Fourth Edition
Guide to Networking Essentials, Fourth Edition

This book is intended to serve the needs of individuals and information systems pro- fessionals who are interested in learning more about networking technologies, but who may have little or no background in this subject matter. In the first edition of this book, the materials were originally designed to help individuals prepare for Microsoft...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Switching to a Mac For Dummies
Switching to a Mac For Dummies

Maybe you love your iPhone or iPod and are curious about other Apple products. Maybe you’ve had one virus scare too many and are fed up with Windows. Maybe the daunting prospect of upgrading to Windows 7 has made you open to other possibilities. Maybe you’re a Mac fan who wants to show a friend how easy and productive Macs...

Scientific Modeling and Simulations (Lecture Notes in Computational Science and Engineering)
Scientific Modeling and Simulations (Lecture Notes in Computational Science and Engineering)

The conceptualization of a problem (modeling) and the computational solution of this problem (simulation), is the foundation of Computational Science. This coupled endeavor is unique in several respects. It allows practically any complex system to be analyzed with predictive capability by invoking the multiscale paradigm linking...

Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Testing of Genetically Modified Organisms in Foods
Testing of Genetically Modified Organisms in Foods

Examine several methods of testing for genetically modified organisms and the reasons behind their strict regulation!

Testing of Genetically Modified Organisms in Foods is the first study of the screening methods and tools utilized for determining the presence of genetically modified organisms (GMOs) in food products. Leading
...

Protocols for Micropropagation of Woody Trees and Fruits
Protocols for Micropropagation of Woody Trees and Fruits

Micropropagation has become a reliable and routine approach for large-scale rapid plant multiplication, which is based on plant cell, tissue and organ culture on well defined tissue culture media under aseptic conditions. A lot of research efforts are being made to develop and refine micropropagation methods and culture media for large-scale...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy