Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Debugging the Development Process
Debugging the Development Process
This book might make Microsoft sound bad.

At least that's one of the concerns I had about telling so many Microsoft war stories. I considered softening and smoothing over some of the stories, or leaving them out altogether, but apart from changing people's names, I decided to keep this book and its examples grounded in reality so that it
...
Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

King Zeno: A Novel
King Zeno: A Novel

A New York Times Book Review Editors' Choice and a Paris Review Staff Pick

A January Pick by Salon, Town and Country, Southern Living, and LA Magazine

New Orleans, 1918. The birth of jazz, the Spanish flu, an ax murderer on the loose. The lives of a...

Electricity And Magnetism (Physics in Our World)
Electricity And Magnetism (Physics in Our World)
THE NUCLEAR BOMBS that ended World War II in 1945 were a convincing and frightening demonstration of the power of physics. A product of some of the best scientific minds in  the world, the nuclear explosions devastated the Japanese cities of Hiroshima and Nagasaki, forcing Japan into an unconditional surrender. But even though the atomic bomb...
Game Design Workshop, Second Edition: A Playcentric Approach to Creating Innovative Games
Game Design Workshop, Second Edition: A Playcentric Approach to Creating Innovative Games
There is magic in games.

Not magic like a Level 19 fi reball spell is magic. Not the kind of magic you get when you purchase a trick in a magic store. And not the kind of mystical experience that organized religion can go on about. No, games are magic in the way that fi rst kisses are magic, the way that fi nally arriving at a perfect
...
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography

Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history...

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

This book is designed to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints of what many are calling cyber warfare today. One comes from a commercial background and the other brings the military viewpoint. The book is designed to help...

Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...

A Theory of the Drone
A Theory of the Drone
Drone warfare has raised profound ethical and constitutional questions both in the halls of Congress and among the U.S. public. Not since debates over nuclear warfare has American military strategy been the subject of discussion in living rooms, classrooms, and houses of worship. Yet as this groundbreaking new work shows, the full...
Teach Your Kids to Code: A Parent-Friendly Guide to Python Programming
Teach Your Kids to Code: A Parent-Friendly Guide to Python Programming

Teach Your Kids to Code is a parent's and teacher's guide to teaching kids basic programming and problem solving using Python, the powerful language used in college courses and by tech companies like Google and IBM.

Step-by-step explanations will have kids learning computational thinking right away, while
...

OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Result Page: 33 32 31 30 29 28 27 26 25 24 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy