Home | Amazing | Today | Tags | Publishers | Years | Search 
Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Saving Darwin: How to Be a Christian and Believe in Evolution
Saving Darwin: How to Be a Christian and Believe in Evolution

Drawing on his fundamentalist upbringing and experience teaching physics at an evangelical college, Giberson has a native understanding of how conservative Christians feel and think about evolution. As a Christian evolutionist, he finds himself occupying a frequently misunderstood middle ground in the midst of a culture war, fought with...

Trauma
Trauma

The most trusted, widely used guide to managing the trauma patient--now in a 2-color format with added algorithms

A Doody's Core Title ESSENTIAL PURCHASE!

4 STAR DOODY'S REVIEW
"Practitioners at any level will benefit from this work originating from major trauma programs in the
...

Mahatma Gandhi (20th Century Biographies)
Mahatma Gandhi (20th Century Biographies)

Mahatma Gandhi led the struggle for Indian independence from the British Empire. The British ruled India for many years. Gandhi also gained civil rights for the Indian population that lived in South Africa.

Although Gandhi was a small, frail man, he faced strong nations using only his weapons of nonviolent resistance. Encouraging...

Metrics and Methods for Security Risk Management
Metrics and Methods for Security Risk Management

Metrics and Methods for Security Risk Management offers powerful analytic tools that have been absent from traditional security texts. This easy-to-read text provides a handy compendium of scientific principles that affect security threats, and establishes quantitative security metrics that facilitate the development of...

Dictionary of Military Terms: Over 6,000 Words Clearly Defined
Dictionary of Military Terms: Over 6,000 Words Clearly Defined
Over 6,000 entries provide up-to-date coverage of British, American, and international military vocabulary.
 
English is the language most frequently used in international military and peacekeeping operations. This dictionary aims to provide a basic vocabulary of British and American terms relating to the...
The Abs Diet: The Six-Week Plan to Flatten Your Stomach and Keep You Lean for Life
The Abs Diet: The Six-Week Plan to Flatten Your Stomach and Keep You Lean for Life

Great-looking abs are more than just a way to support the mirror industry. In fact, strong abs and flat stomachs are the ultimate indicator of overall health-for both men and women. Great abs will help you live longer, sleep better, prevent back pain, and significantly improve your sex life! (And, hey, they don't look half-bad in the...

Destroying the Village
Destroying the Village

Up until the mid-1950s President Dwight D. Eisenhower believed that waging all-out war against an enemy threatening to end your national existence was right, natural, and necessary. In the wake of World War Two this was hardly a controversial position, as memories of Munich, Pearl Harbor, and Adolf Hitler had made the notion of just...

CryENGINE Game Programming with C++, C#, and Lua
CryENGINE Game Programming with C++, C#, and Lua

CryENGINE is a complete 3D game development solution that can run on multiple platforms. It is orientated around giving intuitive tools to the developer. A variety of interactive video games can be created using CryENGINE. CryENGINE is one of the most beginner-friendly engines out there to learn. If you are interested in diving into the...

Basics of Game Design
Basics of Game Design
The video game industry has grown explosively over the past decade and is now a major provider of home entertainment. Since the North American release of the Nintendo Entertainment System (NES) in 1985, game industry revenues have also grown substantially and, according to the marketing research company NDP Group, grossed...
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Disarming Strangers
Disarming Strangers

In June 1994 the United States went to the brink of war with North Korea. With economic sanctions impending, President Bill Clinton approved the dispatch of substantial reinforcements to Korea, and plans were prepared for attacking the North's nuclear weapons complex. The turning point came in an extraordinary private diplomatic...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy