Kuroko No Basuke | Last Exile | Log Horizon
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Translating Statistics to Make Decisions: A Guide for the Non-Statistician
Translating Statistics to Make Decisions: A Guide for the Non-Statistician

Examine and solve the common misconceptions and fallacies that non-statisticians bring to their interpretation of statistical results. Explore the many pitfalls that non-statisticians―and also statisticians who present statistical reports to non-statisticians―must avoid if statistical results are to be correctly used for...

CEH v9: Certified Ethical Hacker Version 9 Study Guide
CEH v9: Certified Ethical Hacker Version 9 Study Guide

The ultimate preparation guide for the unique CEH exam.

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Open-Source ESBs in Action
Open-Source ESBs in Action
Most modern business systems include independent applications that exchange information with each other-a technique usually called enterprise integration. An architectural approach called the Enterprise Service Bus (ESB) offers developers a way to handle the messages between those independent applications without creating a lot of custom code....
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)

This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...

Operating Systems: Internals and Design Principles (5th Edition) (GOAL Series)
Operating Systems: Internals and Design Principles (5th Edition) (GOAL Series)
This book covers concepts, structure, and mechanisms of operating systems. Stallings presents the nature and characteristics of modern-day operating systems clearly and completely. Includes major programming projects. Offers step-by-step web support with CD/Rom Resources. A basic reference for those interested in learning...
Digital Privacy and Security Using Windows: A Practical Guide
Digital Privacy and Security Using Windows: A Practical Guide

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal...

Identity Theft: A Reference Handbook (Contemporary World Issues)
Identity Theft: A Reference Handbook (Contemporary World Issues)

A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.

• Includes a chronology of key decisions, cases, and government action in the development...

CISA: Certified Information Systems Auditor Study Guide
CISA: Certified Information Systems Auditor Study Guide
Take charge of your career with certification that can increase your marketability. Demand for information systems auditors has increased dramatically since the adoption of the Sarbanes-Oxley Act in 2002. Now you can prepare for CISA certification and improve your job skills with the targeted training you'll receive in this valuable book.

...

Stack Silver Get Gold: How To Buy Gold And Silver Bullion Without Getting Ripped Off!
Stack Silver Get Gold: How To Buy Gold And Silver Bullion Without Getting Ripped Off!

Want to learn how to start safely buying gold and silver bullion like a precious metals expert in about an hour?
 

This 2017 updated edition of Stack Silver Get Gold is the only gold and silver investing book you'll ever need because its written by a nationally recognized precious metals...

Result Page: 76 75 74 73 72 71 70 69 68 67 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy