IT eBooks
Download, Read, Use
Hacking Exposed, 6th Edition
Hacking Exposed, 6th Edition

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal. New and updated material! ...
Hacking Exposed Computer Forensics, 2nd Edition
Hacking Exposed Computer Forensics, 2nd Edition

Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. ...
Hacking Exposed Malware and Rootkits
Hacking Exposed Malware and Rootkits

Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the "black art" of malware and rootkits. You will learn how to identify and defend against malicious software and dangerous hidden scripts. The book includes practical examples, case studies, and risk ratings - all in the bestselling Hacking Exposed format. Hacking Exposed: Malware & Rootkits walks you through the processes of analyzing malicious software from start to finish. The book covers different kinds of malware and rootkits, methods of infection, and the latest detection and prevention technologies. ...
Hacking Exposed Wireless, 2nd Edition
Hacking Exposed Wireless, 2nd Edition

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This book discusses the latest developments in Wi-Fi, Bluetooth, ZigBee, and DECT hacking, and explains how to perform penetration tests, reinforce WPA protection schemes, mitigate packet injection risk, and lock down Bluetooth and RF devices. Cutting-edge techniques for exploiting Wi-Fi clients, WPA2, cordless phones, Bluetooth pairing, and ZigBee encryption are also covered in this fully revised guide. ...
Create Stunning HTML Email That Just Works
Create Stunning HTML Email That Just Works

Create Stunning HTML Email That Just Works is a step-by-step guide to creating beautiful HTML emails that consistently work. It begins with an introduction to email covering topics such as: how email design differs from web design; permission based marketing, and the anatomy of an email. The book shows the reader how to plan, design, and build gorgeous HTML email designs that look great in every email program: Outlook, Gmail, Apple Mail, etc. All-important tasks like legal requirements, testing, spam compliance and known hacks and workarounds are covered. ...
Modeling the Internet and the Web
Modeling the Internet and the Web

Modeling the Internet and the Web covers the most important aspects of modeling the Web using a modern mathematical and probabilistic treatment. It focuses on the information and application layers, as well as some of the emerging properties of the Internet. Interdisciplinary in nature, Modeling the Internet and the Web will be of interest to students and researchers from a variety of disciplines including computer science, machine learning, engineering, statistics, economics, business, and the social sciences. ...
Office 2010 Bible, 3rd Edition
Office 2010 Bible, 3rd Edition

Get the very most out of Office 2010 with this all-in-one resource. Microsoft Office Bible 2010 combines the best-of-the-best content from the Excel 2010 Bible, Word 2010 Bible, PowerPoint 2010 Bible, and the Access 2010 Bible. You'll get quickly up to speed on the major power tools of Office 2010 - plus find additional content for Publisher, Outlook, and much more. Put Office 2010 to work and make your work easier with this best-of-the-best guide! ...
Excel 2010 Bible
Excel 2010 Bible

What better way to learn Excel 2010 than from "Mr. Spreadsheet" himself? Excel guru, Microsoft MVP, and author of all the previous top-selling editions of Excel Bible, John Walkenbach provides more than 1,000 pages packed with techniques, tips, and tricks for beginners as well as Excel power users. Discover what's new in Excel 2010, learn shortcuts you didn't know, make the Ribbon interface work for you, and master all the latest ins-and-outs with this must-have guide. ...
Pentaho Kettle Solutions
Pentaho Kettle Solutions

This practical book is a complete guide to installing, configuring, and managing Pentaho Kettle. If you're a database administrator or developer, you'll first get up to speed on Kettle basics and how to apply Kettle to create ETL solutions - before progressing to specialized concepts such as clustering, extensibility, and data vault models. Learn how to design and build every phase of an ETL solution. Get the most out of Pentaho Kettle and your data warehousing with this detailed guide - from simple single table data migration to complex multisystem clustered data integration tasks. ...
Test Driven
Test Driven

In test-driven development, you first write an executable test of what your application code must do. Only then do you write the code itself and, with the test spurring you on, improve your design. In acceptance test-driven development (ATDD), you use the same technique to implement product features, benefiting from iterative development, rapid feedback cycles, and better-defined requirements. TDD and its supporting tools and techniques lead to better software faster. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026