download process

Manual Download



Shopper Award

Publish

Merchants on tradebit get a free subdomain with their account - fully customizable
Sign up

Manuals & Technical eBooks


The Basics Of Cyber Warfare: Understanding The Fundamentals Of Cyber Warfare In Theory And Practice - , Jason Andress

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offe......

ePub format
apps only,
non-refundable!

Download
29.95 USD

Augmented Reality: An Emerging Technologies Guide To Ar - , Joseph Rampolla

With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flow......

ePub format
apps only,
non-refundable!

Download
49.95 USD

Wireless Reconnaissance In Penetration Testing - , Alex Hamerstone

In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconna......

ePub format
apps only,
non-refundable!

Download
49.95 USD

Data Hiding: Exposing Concealed Data In Multimedia, Operating Systems, Mobile Devices And Network Protocols - , Chet Hosmer

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the pre......

ePub format
apps only,
non-refundable!

Download
49.95 USD

Advanced Persistent Threat: Understanding The Danger And How To Protect Your Organization - Eric Cole

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or......

ePub format
apps only,
non-refundable!

Download
49.95 USD
XSeller keywords: eric cole, computers, security

Cuda Programming: A Developer's Guide To Parallel Computing With Gpus - Shane Cook

If you need to learn CUDA but don't have experience with parallel computing, CUDA Programming: A Developer's Introduction offers a detailed guide to CUDA with a grounding in parallel fundamentals. It starts by introducing CUDA and bringing you up ......

ePub format
apps only,
non-refundable!

Download
49.95 USD

Designing The Search Experience: The Information Architecture Of Discovery - , Tyler Tate

Search is not just a box and ten blue links. Search is a journey: an exploration where what we encounter along the way changes what we seek. But in order to guide people along this journey, designers must understand both the art and science of htt......

ePub format
apps only,
non-refundable!

Download
39.95 USD

Information Security Risk Assessment Toolkit: Practical Assessments Through Data Collection And Data Analysis - , Jason Martin

In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in p......

ePub format
apps only,
non-refundable!

Download
49.95 USD
XSeller keywords: mark talabis, jason martin, computers

Agile User Experience Design: A Practitioner's Guide To Making It Work - Diana Brown

Being able to fit design into the Agile software development processes is an important skill in today's market. There are many ways for a UX team to succeed (and fail) at being Agile. This book provides you with the tools you need to determine wha......

ePub format
apps only,
non-refundable!

Download
39.95 USD
XSeller keywords: diana brown, computers, general

Galaxy Tab: The Missing Manual: Covers Samsung Touchwiz Interface - Preston Gralla

Galaxy Tab lets you work, play, read, and connect on the go, but mastering its TouchWiz interface and finding the best apps can be tricky—unless you have this Missing Manual. Gadget whiz Preston Gralla provides crystal-clear explanations and......

ePub format
apps only,
non-refundable!

Download
15.99 USD
XSeller keywords: preston gralla, computers, hardware

Data Governance: How To Design, Deploy And Sustain An Effective Data Governance Program - John Ladley

This book is for any manager or team leader that has the green light to implement a data governance program. The problem of managing data continues to grow with issues surrounding cost of storage, exponential growth, as well as administrative, man......

ePub format
apps only,
non-refundable!

Download
49.95 USD

Intersection: How Enterprise Design Bridges The Gap Between Business, Technology, And People - Milan Guenther

Many organizations struggle with the dynamics and the complexity of today's social ecosystems that connect everyone and everything, everywhere and all the time. Facing challenges at the intersection of business models, technical developments, and ......

ePub format
apps only,
non-refundable!

Download
49.95 USD
XSeller keywords: milan guenther, computers, general

Collaborative Enterprise Architecture: Enriching Ea With Lean, Agile, And Enterprise 2.0 Practices - , Uwe Bombosch

Ever-changing business needs have prompted large companies to rethink their enterprise IT. Today, businesses must allow interaction with their customers, partners, and employees at more touch points and at a depth never thought previously. At the ......

ePub format
apps only,
non-refundable!

Download
49.95 USD
XSeller keywords: stefan bente, uwe bombosch, computers

Keys To The Kingdom: Impressioning, Privilege Escalation, Bumping, And Other Key-based Attacks Against Physical Locks - Deviant Ollam

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the K......

ePub format
apps only,
non-refundable!

Download
49.95 USD
XSeller keywords: deviant ollam, computers, security

Practical Lock Picking: A Physical Penetration Tester's Training Guide - Deviant Ollam

Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming, bumping, and bypassing. Written by Deviant Ollam, one of the security industry's......

ePub format
apps only,
non-refundable!

Download
49.95 USD
XSeller keywords: deviant ollam, computers, security

Browse Catalog

Manuals & Technical