Hakutulokset: Kirjoja kirjailijalta Chris Hurley
yhteensä 21 hakutulosta
Dan Unmasked
This heartfelt middle grade debut about grief, creativity, and the healing power of friendship shows that not all heroes wear capes and is perfect for fans of John David Anderson …
An Occupational Therapist's Guide to Sleep and Sleep Problems
The first book written specifically on clinical applications of sleep and sleep disorder theory for occupational therapists, this book bridges the research to practice gap. …
IT Security Interviews Exposed
Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help Divided into two parts: how to get the job …
InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
"e;InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, …
Tree of Liberty
On January 1, 1804, Jean-Jacques Dessalines declared the independence of Haiti, thus bringing to an end the only successful slave revolution in history and transforming the colony …
IT Security Interviews Exposed
Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will helpDivided into two parts: how to get the job …
Wireless Security: Know It All
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key …
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. …
WarDriving: Drive, Detect, Defend
A guide to WarDriving covers such topics as its origins, setting up a computer system to WarDrive, operating NetStumbler, installing Kismet, mapping WarDrives, and wireless network …
Stealing the Network: How to Own an Identity
The first two books in this series "e;Stealing the Network: How to Own the Box? and "e;Stealing the Network: How to Own a Continent? have become classics in the Hacker and …
Stealing the Network: How to Own an Identity
Provides fictional accounts of criminal hacking techniques, demonstrating how and why such attacks could occur.
OS X Exploits and Defense
Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a …