Running Man Episode 350 | Luke Cage - Tráiler #2 (Netflix) | Dramat / Obyczajowy
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Translating Statistics to Make Decisions: A Guide for the Non-Statistician
Translating Statistics to Make Decisions: A Guide for the Non-Statistician

Examine and solve the common misconceptions and fallacies that non-statisticians bring to their interpretation of statistical results. Explore the many pitfalls that non-statisticians―and also statisticians who present statistical reports to non-statisticians―must avoid if statistical results are to be correctly used for...

Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Molecular Electronics: Commercial Insights, Chemistry, Devices, Architecture and Programming
Molecular Electronics: Commercial Insights, Chemistry, Devices, Architecture and Programming

This book presents an in-depth discussion on molecular electronics in an easy-to-understand manner, aiming at chemists, computer scientists, surface scientists, physicists, and applied mathematicians. Lighter overviews are provided for the science-minded layperson and the high tech entrepreneur in this nanoscale science. The author has...

File System Forensic Analysis
File System Forensic Analysis
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier...
Citrix Access Gateway VPX 5.04 Essentials
Citrix Access Gateway VPX 5.04 Essentials

A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX

Overview

  • A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
  • Establish secure access...
Governance, Risk, and Compliance Handbook for Oracle Applications
Governance, Risk, and Compliance Handbook for Oracle Applications
  • Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
  • Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
  • ...
Lead with a Story: A Guide to Crafting Business Narratives That Captivate, Convince, and Inspire
Lead with a Story: A Guide to Crafting Business Narratives That Captivate, Convince, and Inspire

Storytelling has come of age in the business world. Today, many of the most successful companies use storytelling as a leadership tool. At Nike, all senior executives are designated "corporate storytellers." 3M banned bullet points years ago and replaced them with a process of writing "strategic narratives." Procter &...

Extending Docker
Extending Docker

Key Features

  • Get the first book on the market that shows you how to extend the capabilities of Docker using plugins and third-party tools
  • Master the skills of creating various plugins and integrating great tools in order to enhance the functionalities of Docker
  • A practical and learning guide...
Digital Privacy and Security Using Windows: A Practical Guide
Digital Privacy and Security Using Windows: A Practical Guide

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal...

Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
In many ways, Google is the prototype of a successful twenty-first-century company. It uses technology in new ways to make information universally accessible; promotes a corporate culture that encourages creativity among its employees; and takes its role as a corporate citizen very seriously, investing in green initiatives and developing the...
TCP/IP Analysis and Troubleshooting Toolkit
TCP/IP Analysis and Troubleshooting Toolkit
Discover TCP/IP troubleshooting solutions that solve real-world networking problems

TCP/IP is the backbone of the Internet and corporate networks and has become much more complex in the last decade. If you’re a networking professional, you need to take trouble-shooting to a new level to address this complexity–and adopt solutions...

Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data,...
Result Page: 98 97 96 95 94 93 92 91 90 89 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy