Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and...

AWS Certified Advanced Networking Official Study Guide: Specialty Exam
AWS Certified Advanced Networking Official Study Guide: Specialty Exam

The official study guide for the AWS certification specialty exam

The AWS Certified Advanced Networking Official Study Guide – Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking – Specialty Exam. Expert review of AWS fundamentals align with the exam objectives,...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Numerical Techniques in Electromagnetics with MATLAB
Numerical Techniques in Electromagnetics with MATLAB

Despite the dramatic growth in the availability of powerful computer resources, the EM community lacks a comprehensive text on the computational techniques used to solve EM problems. The first edition of Numerical Techniques in Electromagnetics filled that gap and became the reference of choice for thousands of engineers,...

Autonomous Mobile Robots: Sensing, Control, Decision Making and Applications (Control Engineering)
Autonomous Mobile Robots: Sensing, Control, Decision Making and Applications (Control Engineering)
It has long been the goal of engineers to develop tools that enhance our ability to do work, increase our quality of life, or perform tasks that are either beyond our ability, too hazardous, or too tedious to be left to human efforts. Autonomous mobile robots are the culmination of decades of research and development, and their potential is...
Measurement and Instrumentation: Theory and Application
Measurement and Instrumentation: Theory and Application

Measurement and Instrumentation introduces undergraduate engineering students to the measurement principles and the range of sensors and instruments that are used for measuring physical variables. Based on Morris's Measurement and Instrumentation Principles, this brand new text has been fully updated with coverage of...

Introduction to Information Theory and Data Compression, Second Edition
Introduction to Information Theory and Data Compression, Second Edition
An effective blend of carefully explained theory and practical applications, this text imparts the fundamentals of both information theory and data compression. Although the two topics are related, this unique text allows either topic to be presented independently, and it was specifically designed so that the data compression section requires...
Deploying .NET Applications: Learning MSBuild and ClickOnce (Expert's Voice in .Net)
Deploying .NET Applications: Learning MSBuild and ClickOnce (Expert's Voice in .Net)

Whether building a console application, a web service, or a smart client, you eventually need to distribute your finished work. Deploying .NET Applications is a complete guide to delivering applications built with .NET. Packed with hands-on guidance, practical examples, and war stories from the authors' many experiences with deployment...

Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
How to Persuade People Who Don't Want to be Persuaded: Get What You Want-Every Time!
How to Persuade People Who Don't Want to be Persuaded: Get What You Want-Every Time!
If you’re in business, you’re selling something–a product, an opinion, a new way of doing things. The truth is, even if you don’t think of yourself as a pitchman, you might as well be one. This powerful guide to ethical influence shows you how to use effective persuasion techniques to get what you want the right...
Control of Single Wheel Robots (Springer Tracts in Advanced Robotics)
Control of Single Wheel Robots (Springer Tracts in Advanced Robotics)
This monograph presents a novel concept of a mobile robot, which is a single-wheel, gyroscopically stabilized robot. The robot is balanced by a spinning wheel attached through a two-link manipulator at the wheel bearing, and actuated by a drive motor. This configuration conveys significant advantages including insensitivity to attitude...
HDInsight Essentials
HDInsight Essentials

Tap your unstructured Big Data and empower your business using the Hadoop distribution from Windows

Overview

  • Architect a Hadoop solution with a modular design for data collection, distributed processing, analysis, and reporting
  • Build a multi-node Hadoop cluster on Windows servers
  • ...
Result Page: 117 116 115 114 113 112 111 110 109 108 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy