Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Certified Ethical Hacker (CEH) Foundation Guide
Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...

Learning Wireless Java
Learning Wireless Java
"Learning Wireless Java" is for Java developers who want to quickly come up to speed and create applications for the Micro Edition audience. This book covers the Connected, Limited Device Configuration and the Mobile Information Device Profile (MIDP), both currently available from Javasoft. The CLDC contains APIs for small devices that...
Modelling Distributed Systems (Texts in Theoretical Computer Science. An EATCS Series)
Modelling Distributed Systems (Texts in Theoretical Computer Science. An EATCS Series)
A distributed system is driven by separate components that are executed in parallel, and protocols for such systems form a major aspect of system design in todays world of wireless and mobile networking. Process algebras are languages for the description of elementary parallel systems and are used to study the behavioural properties of distributed...
Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...

Cryptography for Dummies
Cryptography for Dummies

Protect yourself and your business from online eavesdroppers—it’s easier than you think! If you were hoping for a flame-throwing watch or flying a car, we’re sorry—this isn’t James Bond’s equipment manual. Cryptography is a common-sense way to secure stuff on the Internet, and this friendly guidebook makes...

Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Beginning PHP and PostgreSQL E-Commerce: From Novice to Professional
Beginning PHP and PostgreSQL E-Commerce: From Novice to Professional

The PHP language and PostgreSQL database server have long offered an ideal blend of practicality and power for both the novice and experienced programmer alike. Yet the continued evolution of both technologies makes them better suited to drive enterprise-class applications than ever before. In Beginning PHP and PostgreSQL E-Commerce: From...

Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Make: LEGO and Arduino Projects: Projects for extending MINDSTORMS NXT with open-source electronics
Make: LEGO and Arduino Projects: Projects for extending MINDSTORMS NXT with open-source electronics

Make amazing robots and gadgets with two of today’s hottest DIY technologies. With this easy-to-follow guide, you’ll learn how to build devices with Lego Mindstorms NXT 2.0, the Arduino prototyping platform, and some add-on components to bridge the two. Mindstorms alone lets you create incredible gadgets. Bring in Arduino...

Wi-Fi Handbook: Building 802.11b Wireless Networks
Wi-Fi Handbook: Building 802.11b Wireless Networks

Detailing the design and deployment of 802.11b networks in every flavor and size, this working handbook delivers the hands-on expertise you need—complete with illustrative case studies. From one-cell home systems to global provider networks, Wi-Fi Handbook provides the A-Z facts, details, tips, and strategies you need to...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Electronics Demystified
Electronics Demystified
SHOCK YOURSELF BY LEARNING ELECTRONICS

Now anyone with an interest in electronics can master it„oby reading this book. In Electronics Demystified, best-selling science and math writer Stan Gibilisco provides an effective and painless way to understand the electronics that power so much of modern life.

With Electronics...

unlimited object storage image
Result Page: 128 127 126 125 124 123 122 121 120 119 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy