Search alternatives:
torn » turn (Expand Search), born (Expand Search), town (Expand Search)
tarun » tahun (Expand Search), harun (Expand Search), arun (Expand Search)
torus » terus (Expand Search)
tour » our (Expand Search), four (Expand Search), your (Expand Search)
torn » turn (Expand Search), born (Expand Search), town (Expand Search)
tarun » tahun (Expand Search), harun (Expand Search), arun (Expand Search)
torus » terus (Expand Search)
tour » our (Expand Search), four (Expand Search), your (Expand Search)
-
241
Ethical Hacking Workshop : Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity /
Published 2023“…The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools. …”
Get full text
Get full text
software, multimedia -
242
Python for Security and Networking : Leverage Python modules and tools in securing your network and applications /
Published 2018“…The first part of this book will walk you through Python scripts and libraries that you’ll use throughout the book. …”
Get full text
Get full text
software, multimedia -
243
Anatomy, Stretching & Training for Golfers : A Step-by-Step Guide to Getting the Most from Your Golf Workout /
Published 2014“…That's why every golfer needs to read Anatomy, Stretching & Training for Golfers, which offers expert advice on how to maximize your game without the risk of getting hurt. Taking you through stretches that both warm you up before a game and cool you down after, Dr. …”
text -
244
Growing Roses /
Published 2019“…This is the ideal book for those looking to enter the world of growing roses, whether you crave a highly scented, romantic rose for a prime spot, or want to combine shrub roses and flowers in a delightful country border. …”
text -
245
Automate Your Busywork : Do Less, Achieve More, and Save Your Brain for the Big Stuff /
Published 2023“…You'll explore what's possible when you offload repetitive tasks, why automation has democratized innovation, and how you can use cheap—or even completely free—no-code automation tools to transform your ability to focus on what truly matters in your business and life. …”
Get full text
Get full text
software, multimedia -
246
Dancing with Qubits : From qubits to algorithms, embark on the quantum computing journey shaping our future /
Published 2024“…Finally, the book looks to the future and gives you guidance on understanding how further developments may affect you. …”
Get full text
Get full text
software, multimedia -
247
THE SECRETS OF PROFESSIONAL SALES CLOSING /
Published 2006“…Anybody can sell but it's closing that makes the sale and The Secrets Of Professional Soles Closing will show you how to do just that, close the sale, day in day out, year after year. …”
text -
248
AND THEREBY HANGS A TALE /
Published 2010“…From Germany comes Masterpiece, the tale of a priceless oil painting that has remained in the same family for over 200 years, until… To the Channel Islands, and Members Only, where a golf ball falls out of a Christmas cracker and a young man’s life will never be the same again… To Italy, where a young man trying to book a hotel room ends up in bed with the receptionist, unaware that she… To England, where, in High Heels, a woman explains to her husband why a pair of designer shoes couldn’t have gone up in flames because… Some of these stories will make you laugh. Others will bring you to tears. And once again, every one of them will keep you spellbound.…”
text -
249
Indo-Afghan strategic treaty : implications for Pakistan
Published 2012“…The Indo-Afghanistan Strategic Partnership Agreement signed on 4 October, unveils the congruence of US, Afghan and Indian end goals in the war torn country. It also has implications for Pakistani-Afghan relations.…”
Get full text
Get full text
Commentary -
250
EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs /
Published 2023“…As you make progress, you’ll find out how to analyze the firewalls, flows, and proxy logs, as well as detect and investigate cyber threats using various security solution alerts, including EDR, IPS, and IDS. …”
Get full text
Get full text
software, multimedia -
251
Cybersecurity Blue Team Strategies : Uncover the secrets of blue teams to combat cyber threats in your organization /
Published 2023“…Cybersecurity Blue Team Strategies is a comprehensive guide that will help you extend your cybersecurity knowledge and teach you to implement blue teams in your organization from scratch. …”
Get full text
Get full text
software, multimedia -
252
LATEX MADE SIMPLE /
Published 2018“…Then after you have decided the publisher that you want to send your publication, you can copy your document into publisher's LATEX template. …”
text -
253
Quantum Computing for Dummies /
Published 2023“…Quantum Computing For Dummies preps you for the amazing changes that are coming with the world of computing built on the phenomena of quantum mechanics. …”
Get full text
Get full text
software, multimedia -
254
New US strategy : Afghans losing bargaining power
Published 2012“…However this approach runs counter to an Afghan vision of an end state for the war torn country.…”
Get full text
Get full text
Commentary -
255
Global Bifurcations Organizing Weak Chimeras in Three Symmetrically Coupled Kuramoto Oscillators with Inertia
Published 2025“…Hence, it is interesting to understand precisely how frequency synchrony is lost and how invariant sets such as attracting weak chimeras are generated at torus breakup, where the phase description breaks down. …”
Journal article -
256
USER RESEARCH WITH KIDS : HOW TO EFFECTIVELY CONDUCT RESEARCH WITH PARTICIPANTS AGED 3-16 /
Published 2021“…If you are a designer, producer, marketer, or researcher creating products for children, it is essential that you are aware of the key differences between children and adults when it comes to user journeys. …”
text -
257
POWER TO CHOOSE /
Published 1991“…The POWER TO CHOOSE the life you want. Itis a book packed with practical, down-to-earth ideas that will help you develop better self-esteem and self-confidence. …”
text -
258
Security Orchestration, Automation, and Response for Security Analysts : Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture /
Published 2023“…The final portion of this book will guide you through best practices and case studies that you can implement in real-world scenarios. …”
Get full text
Get full text
software, multimedia -
259
Duterte: Delivering the Promised Peace to Mindanao
Published 2016“…After years of starts-stops and derailment of peace agreements, the Philippines is today poised to make a peace breakthrough in strife-torn Muslim-dominated Mindanao in southern Philippines. …”
Get full text
Get full text
Commentary -
260
What We Talk About When We Talk About Books : The History and Future of Reading /
Published 2019“…Reports of the death of reading are greatly exaggerated. Do you worry that you've lost patience for anything longer than a tweet? …”
Get full text
software, multimedia