USA , UK | Scarica XAPK | Read More ...
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Mobile Cloud Computing: Models, Implementation, and Security
Mobile Cloud Computing: Models, Implementation, and Security

Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction to mobile cloud computing, including key concepts, models, and relevant applications. The book focuses on novel and advanced algorithms, as well as mobile app development.

The book begins with an overview of mobile...

Location-Aware Applications
Location-Aware Applications

Summary

Location-Aware Applications is a comprehensive guide to the technology and business of creating compelling location-based services and applications. The book walks you through the LBS landscape, from mapping technologies to available platforms; from toolkits to business questions like monetization...

Anonymous Communication Networks: Protecting Privacy on the Web
Anonymous Communication Networks: Protecting Privacy on the Web

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.

Addressing the demand for authoritative information on
...

Digital Privacy and Security Using Windows: A Practical Guide
Digital Privacy and Security Using Windows: A Practical Guide

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal...

Unit and Ubiquitous Internet of Things
Unit and Ubiquitous Internet of Things

Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.

Answering fundamental questions about IoT architectures and models, Unit and Ubiquitous
...

Wireless A to Z
Wireless A to Z
THE MOST PRECISE, CONCISE, AND AUTHORITATIVE WIRELESS REFERENCE AVAILABLE!

In today’s information-rich environment, a business operating without a cogent wireless communications strategy is destined for failure. That’s why, if designing, maintaining, or upgrading wireless and mobile communications systems...

Algorithms and Theory of Computation Handbook, Second Edition, Volume 2: Special Topics and Techniques
Algorithms and Theory of Computation Handbook, Second Edition, Volume 2: Special Topics and Techniques

Algorithms and Theory of Computation Handbook, Second Edition: Special Topics and Techniques provides an up-to-date compendium of fundamental computer science topics and techniques. It also illustrates how the topics and techniques come together to deliver efficient solutions to important practical problems.

Along...

Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)
Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking and authoritative resource, Human-Computer Interaction Fundamentals emphasizes...
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
Moodle 3 Administration - Third Edition
Moodle 3 Administration - Third Edition

Key Features

  • Learn how to plan, install, optimize, customize, and configure Moodle
  • Guarantee a cutting-edge learning experience in a secure and customizable environment while optimizing your day-to-day workload
  • A one-stop guide with a problem-solution approach and a wide range of real-world...
Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
Google Speaks: Secrets of the World's Greatest Billionaire Entrepreneurs, Sergey Brin and Larry Page
In many ways, Google is the prototype of a successful twenty-first-century company. It uses technology in new ways to make information universally accessible; promotes a corporate culture that encourages creativity among its employees; and takes its role as a corporate citizen very seriously, investing in green initiatives and developing the...
Result Page: 36 35 34 33 32 31 30 29 28 27 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy