Home | Amazing | Today | Tags | Publishers | Years | Search 
HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Network Security Portable Reference

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted...

An Introduction to Parametric Digital Filters and Oscillators
An Introduction to Parametric Digital Filters and Oscillators
    Since the 1960s Digital Signal Processing (DSP) has been one of the most intensive fields of study in electronics. However, little has been produced specifically on linear non-adaptive time-variant digital filters.
  • The first book to be dedicated to Time-Variant Filtering
  • Provides a complete...
Encyclopaedia Arcane: Blood Magic
Encyclopaedia Arcane: Blood Magic
The ancient practice of blood magic has been outlawed in many civilised societies, for though it allows access to staggering levels of magical power the price can be very high. Savage tribes often respect blood magic, though even they tend to fear and avoid it where possible – its power is the stuff of legend, to be invoked only by those who...
Red Hat Linux Pocket Administrator
Red Hat Linux Pocket Administrator

Your On-the-Job Quick Reference

Carry essential Red Hat Linux administration and troubleshooting information right in your back pocket so you can handle a wide variety of tasks on-the-spot. This handy resource covers key management topics, with an emphasis on system administration, and gives you quick solutions in an easy-to-find format....

Use Cases: Requirements in Context, Second Edition
Use Cases: Requirements in Context, Second Edition

This book describes how to gather and define software requirements using a process based on use cases. It shows systems analysts and designers how use cases can provide solutions to the most challenging requirements issues, resulting in effective, quality systems that meet the needs of users.

Use Cases, Second Edition:...

Jakarta Pitfalls: Time-Saving Solutions for Struts, Ant, JUnit, and Cactus
Jakarta Pitfalls: Time-Saving Solutions for Struts, Ant, JUnit, and Cactus
Escape from common coding pitfalls with this detailed book of proven Jakarta missteps and solutions

The dangers of Jakarta pitfalls are everywhere and countless developers have already been trapped. These mistakes have delayed schedules, allowed major bugs to get into the users’ hands, or led to numerous rewrites in maintenance. Luckily,...

Microsoft CRM for Dummies
Microsoft CRM for Dummies
Tailor Microsoft CRM to manage records and workflow for your business

Find out how to target your sales efforts and become a customer service leader

A happy customer is a repeat customer, so how do you make ’em happy? You can manage, with Microsoft CRM and this friendly guide by your side! Find out how easily you can provide...

Solar Technologies for Buildings
Solar Technologies for Buildings
Solar technologies are emerging as the sustainable technology of choice for those commissioning new buildings. Integrated photovoltaics offer huge potential for delivering renewable energy without generating harmful pollutants.

Discussing current market conditions and the economics of this technology, the author balances the physics and...

The Science of Color, Second Edition
The Science of Color, Second Edition

This second edition of The Science of Color focuses on the principles and observations that are foundations of modern color science. Written for a general scientific audience, the book broadly covers essential topics in the interdisciplinary field of color, drawing from physics, physiology and psychology. The jacket of the original edition of...

CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide (Exams SECUR,CSPFA, CSVPN, CSIDS, and CSI)
CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide (Exams SECUR,CSPFA, CSVPN, CSIDS, and CSI)

Prepare to pass all five CCPS certification exams

Get complete coverage of all the material included on he Cisco Certified Security Professional Certification (CCSP) exams inside this comprehensive, up-to-date resource. With full treatment of all the exam topics, this definitive, dual-purpose tool contains helpful exam tips, sample...

Shoot Like a Pro! Digital Photography Techniques
Shoot Like a Pro! Digital Photography Techniques

Special color section: 35 secrets the pros know!

Take your digital photography to the next level with help from this wonderfully written guidebook. Best-selling author Julie Adair King shows you the secrets that professional photographers use to capture memorable portraits, spectacular nature and travel images, and eye-catching product...

Creating Components
Creating Components
This text describes how concurrency works, how to more effectively deploy it in program components, and how to reuse these components to improve program design, quality, and performance.

Concurrency is a powerful technique for developing efficient and lightning- fast software. For instance, concurrency can be used in common applications...

Result Page: Previous 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy