The Browser Hacker's Handbook
Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security...
Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach
This book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment
Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book...
3D Printing with Autodesk 123D, Tinkercad, and MakerBot (Electronics)
Master the art of 3D printing with step-by-step tutorials and DIY projects
Are you ready to join the new industrial revolution? 3D Printing with Autodesk 123D, Tinkercad, and MakerBot reveals how to turn your ideas into physical products that you can use or sell! You'll learn how to operate powerful, free...
Understanding Wind Power Technology: Theory, Deployment and Optimisation
Wind energy technology has progressed enormously over the last decade. In coming years it will continue to develop in terms of power ratings, performance and installed capacity of large wind turbines worldwide, with exciting developments in offshore installations.
Designed to meet the training needs of wind engineers, this...
SAP HANA Administration (HANA Admin) (SAP PRESS)
Who says that a leopard can't change its spots? With the advent of SAP HANA, database administration is evolving and you can evolve along with it.
Learn how traditional administration concepts are applied in SAP HANA, and find out about the new concepts relevant to an in-memory database.
Novice or expert, this book...
|Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next |