Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cloud Computing Strategies
Cloud Computing Strategies
Over the last few years daily papers as well as weekly and monthly magazines and the media have been heralding “digital U.S.,” “digital Europe,” and “digital Asia.” America and most countries of the European Union are already wired. They score highly on access to broadband, while Internet has...
Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Our civilization runs on software. Yet the art of creating it continues to be a dark mystery, even to the experts, and the greater our ambitions, the more spectacularly we seem to fail.

Big software projects regularly crash and burn--just ask the FBI and the IRS, the Pentagon and the FAA, or any decent-size corporation. The...

Secure Roaming in 802.11 Networks (Communications Engineering)
Secure Roaming in 802.11 Networks (Communications Engineering)
WLAN users want to remain connected to the network as they move from place to place in an office building, airport, library, etc. But the original 802.11 standard was not designed to support roaming. However, enhancements to the 802.11 now make it possible to add reliable, secure roaming capabilities to any 802.11-based WLAN. This thorough guide...
Microsoft Windows 7 Unleashed
Microsoft Windows 7 Unleashed

Covers Release Candidate of Windows 7. 

With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.

 

Microsoft® Windows 7 Unleashed...

Deploying License-Free Wireless Wide-Area Networks
Deploying License-Free Wireless Wide-Area Networks
Best practices for planning and deployment of broadband WWANs.

Choose the right network architecture for your wireless network
Conduct physical site surveys and radio-frequency (RF) site surveys
License-free broadband wireless wide-area networks (WWANs) provide fast deployment of lowcost,
high-speed "last-mile"
...
Linux Mint System AdministratorA¢a‚¬a„¢s Beginners Guide
Linux Mint System AdministratorA¢a‚¬a„¢s Beginners Guide

Probably the fastest route to becoming a Linux Mint system administrator, this book takes you from A–Z with clear step-by-step instructions, ranging from basic installation, to configuring networks, to troubleshooting. The perfect primer.

Overview

What you will learn from this book

...

The Lessons of Tragedy: Statecraft and World Order
The Lessons of Tragedy: Statecraft and World Order
An eloquent call to draw on the lessons of the past to address current threats to international order

The ancient Greeks hard?wired a tragic sensibility into their culture. By looking disaster squarely in the face, by understanding just how badly things could spiral out of control, they sought to create a
...
Windows 7 QuickSteps
Windows 7 QuickSteps
Step-by-Step, Full-Color Graphics!

Get started using Windows 7 right away--the QuickSteps way. Color screenshots with streamlined explanations show you how to use all the new and improved features of this sleek operating system. You'll find tips for customizing your desktop, managing files, connecting to the Internet, using...

Decrypted Secrets: Methods and Maxims of Cryptology
Decrypted Secrets: Methods and Maxims of Cryptology
"The best single book on cryptology today." --Cryptologia (from a review of a previous edition)

"It is an outstanding book that assumes only elementary mathematical knowledge and is interspersed with many exciting, amusing, and sometimes personal stories from the history of cryptology."
...
Windows® 7 Inside Out
Windows® 7 Inside Out
You re beyond the basics, so dive right in and really put your PC to work! This supremely organized reference is packed with hundreds of timesaving solutions, troubleshooting tips, and workarounds. It s all muscle and no fluff. Discover how the experts tackle Windows 7 and challenge yourself to new levels of mastery! Compare features and...
Computer and Intrusion Forensics (Artech House Computer Security Series)
Computer and Intrusion Forensics (Artech House Computer Security Series)
Computer forensics and intrusion forensics are rapidly becoming
mainstream activities in an increasingly online society due to the
ubiquity of computers and computer networks. We make daily use of
computers either for communication or for personal or work transactions.
From our desktops and laptops we access Web servers, e-mail
...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy