Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Joe Celko's Analytics and OLAP in SQL (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko's Analytics and OLAP in SQL (The Morgan Kaufmann Series in Data Management Systems)
The First book that teaches what SQL programmers need in order to successfully make the transition from transactional systems (OLTP) into the world of OLAP.

Before SQL programmers could begin working with OLTP (On-Line Transaction Processing) systems, they had to unlearn procedural, record-oriented programming before moving
...
Electricity And Magnetism (Physics in Our World)
Electricity And Magnetism (Physics in Our World)
THE NUCLEAR BOMBS that ended World War II in 1945 were a convincing and frightening demonstration of the power of physics. A product of some of the best scientific minds in  the world, the nuclear explosions devastated the Japanese cities of Hiroshima and Nagasaki, forcing Japan into an unconditional surrender. But even though the atomic bomb...
Blender 3D Incredible Machines
Blender 3D Incredible Machines

Key Features Develop realistic and awesome machines for your 3D projects and animation films Gain the ability to look at a piece of machinery in real life and then recreate it in Blender Develop a comprehensive skill set covering key aspects of mechanical modeling Book Description Blender 3D is one of the top pieces of 3D animation software....

Teach Your Kids to Code: A Parent-Friendly Guide to Python Programming
Teach Your Kids to Code: A Parent-Friendly Guide to Python Programming

Teach Your Kids to Code is a parent's and teacher's guide to teaching kids basic programming and problem solving using Python, the powerful language used in college courses and by tech companies like Google and IBM.

Step-by-step explanations will have kids learning computational thinking right away, while
...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

Honeypots: Tracking Hackers
Honeypots: Tracking Hackers

"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute

"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture...

OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
I graduated from Long Island University in 1991 with a bachelor’s degree in political science. In the years since, much of the specifi c material I learned has been forgotten in the whirlwind of family and career life. Even so, there are some important lessons I still recall. Dr. Donald Baker often told us undergraduate students that states...
Big Think Strategy: How to Leverage Bold Ideas and Leave Small Thinking Behind
Big Think Strategy: How to Leverage Bold Ideas and Leave Small Thinking Behind

Business leaders need bold strategies to stay relevant and win. In "Big Think Strategy", Schmitt shows how to bring bold thinking into your business by sourcing big ideas and executing them creatively. With the tools in this book, any leader can overcome institutionalized 'small think' - the inertia, the narrow-mindedness,...

Result Page: 33 32 31 30 29 28 27 26 25 24 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy