Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

HTML, CSS & JavaScript Web Publishing in One Hour a Day, Sams Teach Yourself: Covering HTML5, CSS3, and jQuery (7th Edition)
HTML, CSS & JavaScript Web Publishing in One Hour a Day, Sams Teach Yourself: Covering HTML5, CSS3, and jQuery (7th Edition)

Thoroughly revised and updated with examples rewritten to conform to HTML5, CSS3, and contemporary web development practices, this easy-to-understand, step-by-step tutorial helps you quickly master the basics of HTML and CSS before moving on to more advanced topics such as graphics, video, and interactivity with...
Data Wrangling with Python: Tips and Tools to Make Your Life Easier
Data Wrangling with Python: Tips and Tools to Make Your Life Easier

How do you take your data analysis skills beyond Excel to the next level? By learning just enough Python to get stuff done. This hands-on guide shows non-programmers like you how to process information that’s initially too messy or difficult to access. You don't need to know a thing about the Python programming language to...

A Guide to Eighteenth-Century Art
A Guide to Eighteenth-Century Art

A Guide to Eighteenth-Century Art offers an introductory overview of the art, artists, and artistic movements of this exuberant period in European art, and the social, economic, philosophical, and political debates that helped shape them. 

  • Covers both artistic developments and critical approaches to the period...
Absolute Beginners Guide to Computing
Absolute Beginners Guide to Computing

Learn and understand how you can perform a wide range of tasks on your new Windows computer, including managing files, browsing the internet, and protecting yourself, as well as interacting with Cortana.

Using Absolute Beginners Guide to Computing you will see how to use Windows, and how you can connect and...

Cutting and Draping Party and Eveningwear: Pattern Cutting for Special Occasion Clothes
Cutting and Draping Party and Eveningwear: Pattern Cutting for Special Occasion Clothes
When you want to dress up, this is the complete guide to creating special-occasion clothes—party dresses and eveningwear. With step-by-step instructions, Dawn Cloake explains how to develop basic design blocks for a wide range of garments, and then mix and match the elements to make something that’s truly unique. She includes...
NTP Security: A Quick-Start Guide
NTP Security: A Quick-Start Guide

Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network will be taken offline.

NTP Security: A Quick-Start...

PHP Beyond the Web
PHP Beyond the Web

Use your existing web-based PHP skills to write all types of software: CLI scripts, desktop software, network servers, and more. This book gives you the tools, techniques, and background necessary to write just about any type of software you can think of, using the PHP you know.

PHP Beyond the Web...

Learning Analytics in R with SNA, LSA, and MPIA
Learning Analytics in R with SNA, LSA, and MPIA

This book introduces Meaningful Purposive Interaction Analysis (MPIA) theory, which combines social network analysis (SNA) with latent semantic analysis (LSA) to help create and analyse a meaningful learning landscape from the digital traces left by a learning community in the co-construction of knowledge.    

...

iOS Penetration Testing: A Definitive Guide to iOS Security
iOS Penetration Testing: A Definitive Guide to iOS Security
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure. 

When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to
...
Learn Linux in a Month of Lunches
Learn Linux in a Month of Lunches

Summary

Learn Linux in a Month of Lunches shows you how to install and use Linux for all the things you do with your OS, like connecting to a network, installing software, and securing your system. Whether you're just curious about Linux or have to get up and running for your job, you'll appreciate...

Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance...

unlimited object storage image
Result Page: Previous 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy