Home | Amazing | Today | Tags | Publishers | Years | Search 
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Nuclear, Chemical, and Biological Terrorism: Emergency Response and Public Protection
Nuclear, Chemical, and Biological Terrorism: Emergency Response and Public Protection
This book provides guidance on measures that should be considered to protect human lives from terrorist activities involving nuclear, chemical, and biological weapons. It provides a historical summary of the development and use of these weapons, and continues with a detailed discussion of the types of radiation and warfare agents that are...
Services Blueprint: Roadmap for Execution (Addison-Wesley Information Technology Series)
Services Blueprint: Roadmap for Execution (Addison-Wesley Information Technology Series)
The Need for a Services Blueprint

As business processes increasingly become digitized, the role of management is changing from technology users to the reluctant “architects of services blueprints.” They need answers to strategic questions such as:

  • What kind of...
IS Management Handbook, 8th Edition
IS Management Handbook, 8th Edition
The first few years of the new millennium have been a challenging time for the information technology (IT) manager. The initial economic euphoria that greeted the successful completion of Y2K projects worldwide was quickly followed by a dramatic shakedown within U.S.-based industries most closely related to the growth of the Internet. Today,...
Biology Demystified (TAB Demystified)
Biology Demystified (TAB Demystified)
Guide to understanding basic and applied scientific information, for those who've had not formal training in biology. Includes more than 150 illustrations, a pronunciation guide, self-tests, and reviews. Softcover. DLC: Biology.

UNDERSTAND BIOLOGY -- WITHOUT DISSECTING ANYTHING!

If you're years removed...

Methamphetamine Use: Clinical and Forensic Aspects (Pacific Institute Series on Forensic Psychology)
Methamphetamine Use: Clinical and Forensic Aspects (Pacific Institute Series on Forensic Psychology)

A man is accused of attempted murder of a former crystal meth addict. He claims he shot in self-defense, responding to the extremely aggressive behavior the victim was exhibiting. How will this play out in court? Most likely, the prosecution and the defense will call various expert witnesses - perhaps neurologists, psychologists, pathologists...

MCSD Analyzing Requirements and Defining .NET Solutions Architectures Study Guide (Exam 70-300 (Certification Press)
MCSD Analyzing Requirements and Defining .NET Solutions Architectures Study Guide (Exam 70-300 (Certification Press)

Based on 300,000+ hours of IT training experience, this Study Guide provides 100% coverage of all objectives for exam 70-310. Coverage includes the .NET Framework, Visual Studio .NET, creating physical designs, developing solution concepts, and more.

  • 100% Complete Coverage—All official test...
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions

Much of the U.S. economy is now based on services rather than manufacturing. Yet the majority of books on Six Sigma and Lean--today's major quality improvement initiatives--explain only how to implement these techniques in a manufacturing environment.

Lean Six Sigma for Services fills the need for a service-based approach,...

Firewalls for Dummies, Second Edition
Firewalls for Dummies, Second Edition
Guard your DSL and protect your personal information

Keep your network safe from viruses, saboteurs, eavesdroppers, and other bad guys

We don’t want to scare you, but "they" are out there! Don’t venture into lawless cyberspace without this trusty guide. It’ll help you evaluate the danger, understand how...

Space-Time Coding
Space-Time Coding
Space–Time Coding provides an introduction to the subject and its application to wireless communication systems. With the integration of internet and multimedia applications in next generation wireless communications, the demand for wide-band high data rate communication services is growing. Space–time coding is based on...
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1)
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design, 1)

Database Design Using Entity-Relationship Diagrams clarifies ER diagram design by defining it in terms of requirements (end user requests) and specifications (designer feedback to that request). The book emphasizes how communication between designers and users during design is crucial for the elicitation of targeted data, and for the creation of...

Computational Inverse Techniques in Nondestructive Evaluation
Computational Inverse Techniques in Nondestructive Evaluation
Although many books on inverse problems already exist, they can be quite mathematical in nature and pay little attention to practical applications. This book forms a bridge between the theoretical foundations and practical applications of nondestructive evaluation methods. With unique emphasis on inverse problems in solid mechanics, it describes in...
Result Page: Previous 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy