Home | Amazing | Today | Tags | Publishers | Years | Search 
Traumatic Dental Injuries in Children: A Clinical Guide to Management and Prevention
Traumatic Dental Injuries in Children: A Clinical Guide to Management and Prevention

This book is a clinical guide to the prevention and management of traumatic dental injuries, including crown and root fractures and luxation injuries, in children of all ages.  Readers will find clear descriptions of the challenges posed by the pediatric population, the evaluation of injuries, diagnosis, management, and...

Hands-On System Programming with Linux: Explore Linux system programming interfaces, theory, and practice
Hands-On System Programming with Linux: Explore Linux system programming interfaces, theory, and practice

Get up and running with system programming concepts in Linux

Key Features

  • Acquire insight on Linux system architecture and its programming interfaces
  • Get to grips with core concepts such as process management, signalling and pthreads
  • Packed with industry...
React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL
React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL

Over 66 hands-on recipes that cover UI development, animations, component architecture, routing, databases, testing, and debugging with React

Key Features

  • Use essential hacks and simple techniques to solve React application development challenges
  • Create native mobile...
Deep Belief Nets in C++ and CUDA C: Volume 2: Autoencoding in the Complex Domain
Deep Belief Nets in C++ and CUDA C: Volume 2: Autoencoding in the Complex Domain
Discover the essential building blocks of a common and powerful form of deep belief net: the autoencoder. You’ll take this topic beyond current usage by extending it to the complex domain for signal and image processing applications. Deep Belief Nets in C++ and CUDA C: Volume 2 also covers several...
Hands-On Reactive Programming with Clojure: Create asynchronous, event-based, and concurrent applications, 2nd Edition
Hands-On Reactive Programming with Clojure: Create asynchronous, event-based, and concurrent applications, 2nd Edition

Learn how to use RxClojure to deal with stateful computations

Key Features

  • Leverage the features of Functional Reactive Programming using Clojure
  • Create dataflow-based systems that are the building blocks of Reactive Programming
  • Use different Functional...
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Mastering C++ Game Development: Create professional and realistic 3D games using C++ 17
Mastering C++ Game Development: Create professional and realistic 3D games using C++ 17

High-end game development with advanced C++ 17 programming techniques

Key Features

  • Make the best use of object-oriented capabilities of C++ to develop high-end games
  • Create reusable C++ libraries and editor tools for your game
  • Series of example projects...
Learn Blockchain Programming with JavaScript: Build your very own Blockchain and decentralized network with JavaScript and Node.js
Learn Blockchain Programming with JavaScript: Build your very own Blockchain and decentralized network with JavaScript and Node.js

Explore the essentials of blockchain technology with JavaScript to develop highly secure bitcoin-like applications

Key Features

  • Develop bitcoin and blockchain-based cryptocurrencies using JavaScript
  • Create secure and high-performant blockchain networks
  • ...
Isomorphic Go: Learn how to build modern isomorphic web applications using the Go programming language, GopherJS, and the Isomorphic Go toolkit
Isomorphic Go: Learn how to build modern isomorphic web applications using the Go programming language, GopherJS, and the Isomorphic Go toolkit

Learning about isomorphic development in Go leads to a unified view of web and back-end development: It extends the remit of a server-side programming language to the browser.

Key Features

  • Learn how to build Isomorphic Go web applications
  • Neatly organize your isomorphic...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Get SQL Server up and running on the Linux operating system and containers. No database professional managing or developing SQL Server on Linux will want to be without this deep and authoritative guide by one of the most respected experts on SQL Server in the industry. Get an inside look at how SQL Server for Linux works through the...
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Result Page: 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy