Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover...
Matrix and Tensor Calculus: With Applications to Mechanics, Elasticity and Aeronautics
Matrix and Tensor Calculus: With Applications to Mechanics, Elasticity and Aeronautics
This volume is based on a series of lectures on matrix calculus and tensor calculus, and their applications, given under the sponsorship of the Engineering, Science, and Management War Training (ESMWT) program, from August 1942 to March 1943. The group taking the course included a considerable number of outstanding research engineers and directors...
Learn Google (Wordware's Internet Library)
Learn Google (Wordware's Internet Library)
Many people today use the Internet to send and receive e-mail,
shop, pay bills, search for lost relatives and ancestors, chat with
kindred spirits in obscure chat rooms, play games, view movies, listen
to music, find partners, search for jobs, search for employees,
research medical issues, find inexpensive hotels and vacation
...
The Notebook
The Notebook

Every so often a love story so captures our hearts that it becomes more than a story-it becomes an experience to remember forever. The Notebook is such a book. It is a celebration of how passion can be ageless and timeless, a tale that moves us to laughter and tears and makes us believe in true love all over again... At thirty-one, Noah...

Geeks and Geezers
Geeks and Geezers
We were drawn to thinking and then ultimately writing about geeks and geezers from very different starting points. Coauthoring a book isn’t quite like synchronized swimming. It’s more like gaining perspective and depth through incongruity. Through writing and arguing in what seemed like endless and percussive...
Outsmarting Social Media: Profiting in the Age of Friendship Marketing
Outsmarting Social Media: Profiting in the Age of Friendship Marketing

The war is on. The titanic battle between Google and Facebook has begun—and you can use it to earn more profits! In this book, Evan Bailyn reveals how to attract friendship-based recommendations that will motivate customers more than any ad or algorithm. Bailyn explains how today’s...

Honeypots: Tracking Hackers
Honeypots: Tracking Hackers

"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute

"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture...

IR Theory, Historical Analogy, and Major Power War
IR Theory, Historical Analogy, and Major Power War
This book critically examines elements of America-First nationalism, neo-conservatism, neo-realism, neo-liberalism, environmental theories, and social constructionism by way of developing an “alternative realist” approach to the study of the origins of major power war. The author critiques concepts of “polarity” and...
Talking to Strangers
Talking to Strangers

Talking to Strangers is a freshly curated collection of prose, spanning fifty years of work and including famous as well as never-before-published early writings, from 2018 Man Booker Prize–finalist Paul Auster.

Beginning with a short philosophical meditation written when he was twenty and
...

The Well Timed Strategy: Managing the Business Cycle for Competitive Advantage
The Well Timed Strategy: Managing the Business Cycle for Competitive Advantage

Most companies ignore one of their best opportunities for honing competitive advantage: the opportunity to proactively manage business cycles and macroeconomic turbulence. Despite the profound impact that the business cycle has on the fortunes and fate of so many businesses large and small--and the employees and investors...

Between Utopia and Realism: The Political Thought of Judith N. Shklar (Haney Foundation Series)
Between Utopia and Realism: The Political Thought of Judith N. Shklar (Haney Foundation Series)

From her position at Harvard University's Department of Government for over thirty-five years, Judith Shklar (1928-92) taught a long list of prominent political theorists and published prolifically in the domains of modern and American political thought. She was a highly original theorist of liberalism, possessing a broad and...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy