Next » | Very Pure | Black Clover saison 1 episode 41 streaming
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BeagleBone for Secret Agents
BeagleBone for Secret Agents

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • ...
Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
Coding Projects in Python
Coding Projects in Python

Using fun graphics and easy-to-follow instructions, this straightforward, this visual guide shows young learners how to build their own computer projects using Python, an easy yet powerful free programming language available for download.

Perfect for kids ages 10 and over who are ready to take a second step after Scratch, Coding...

Behold a Pale Horse
Behold a Pale Horse
Sometime ago I had the opportunity to meet William Cooper and his wife Annie. It was part of my job to verify whether this man did indeed speak the truth or was just another person seeking fame and fortune. What I found was a rugged, bulldog, driven individual who was kind, thoughtful and tenderhearted. He was truly concerned about you and your...
America's Secret Establishment: An Introduction to the Order of Skull & Bones
America's Secret Establishment: An Introduction to the Order of Skull & Bones
The book began with an anonymous donation to the author of an 8-inch package of documents in the early 1980s. Nothing less than the membership list and supporting documents for a truly secret society the Yale Skull and Bones.

The late Johnny Johnson, of Phoenix Arizona was the spark that moved me to write first a
...
Digital Privacy and Security Using Windows: A Practical Guide
Digital Privacy and Security Using Windows: A Practical Guide

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal...

Physical Layer Security in Wireless Communications (Wireless Networks and Mobile Communications)
Physical Layer Security in Wireless Communications (Wireless Networks and Mobile Communications)

Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the...

Filmmaking For Dummies (Career/Education)
Filmmaking For Dummies (Career/Education)
"I found Filmmaking For Dummies a thorough and informative read: a complete A to Z that demystifies not only production, but pre- and post- production as well. Stoller paints a picture of filmmaking so basic that you'd have to be not just a dummy but completely braindead if you're unable to make your own movie after closing the...
SOA Modeling Patterns for Service Oriented Discovery and Analysis
SOA Modeling Patterns for Service Oriented Discovery and Analysis

One of the most challenging tasks in today’s business and information technology (IT) environments is to communicate a solution to an organizational problem in a simple manner that can be easily understood by business and IT personnel alike. Is it also arduous to explain in simple words how a remedy to an enterprise concern can be...

The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
The Project Management Advisor: 18 Major Project Screw-Ups, and How to Cut Them off at the Pass
The Project Management Advisor: 18 Major Project Screw-Ups, and How to Cut Them off at the Pass

This is the eBook version of the printed book.

This is your complete, hands-on guide to saving projects in trouble.

Drawing on 20 years of frontline project management experience, Lonnie Pacelli identifies the 18 most pervasive causes of project failure: their causes, early warning signs, and how to fix them...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy