Home | Amazing | Today | Tags | Publishers | Years | Search 
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and...

Emotional Intelligence Pocketbook: Little Exercises for an Intuitive Life
Emotional Intelligence Pocketbook: Little Exercises for an Intuitive Life

A practical "how-to" guide to changing the way you think about your emotions

Bestselling personal development author Gill Hasson is back with this pocket sized guide to dealing with your emotions. Learn how to understand yourself and those around you with practical tips and tricks that will help you be more...

Pets (The Art of Living)
Pets (The Art of Living)

'When I play with my cat, who knows if I am not a pastime to her more than she is to me?' - Michel de Montaigne. Why do we live with pets? Is there something more to our relationship with them than simply companionship? What is it we look for in our pets and what does this say about us as human beings? In this fascinating book, Erica...

Building Python Real-Time Applications with Storm
Building Python Real-Time Applications with Storm

Learn to process massive real-time data streams using Storm and Python―no Java required!

About This Book

  • Learn to use Apache Storm and the Python Petrel library to build distributed applications that process large streams of data
  • Explore sample applications in real-time and analyze...
Python Requests Essentials
Python Requests Essentials

Learn how to integrate your applications seamlessly with web services using Python Requests

About This Book

  • A fast-paced guide that demonstrates the use of Python Requests with the help of examples
  • Learn web scraping with Beautiful Soup and Python Requests libraries
  • ...
Learning Play! Framework 2
Learning Play! Framework 2

The Play Framework makes it easy to build web applications with Java & Scala, and this user-friendly tutorial makes it simpler still. Focusing on HTTP, everything is integrated so you need virtually no prior coding ability.

Overview

  • While driving in Java, tasks are also presented in Scala – a...
Java Persistence with Hibernate
Java Persistence with Hibernate

Summary

Java Persistence with Hibernate, Second Edition explores Hibernate by developing an application that ties together hundreds of individual examples. In this revised edition, authors Christian Bauer, Gavin King, and Gary Gregory cover Hibernate 5 in detail with the Java Persistence 2.1 standard (JSR...

Magento: Beginner's Guide - Second Edition
Magento: Beginner's Guide - Second Edition

As a non-techie you might be a bit daunted at the thought of taking on an e-commerce system as powerful as Magento. But don't be - our guide makes it all so accessible with its user-friendly, absolute-beginner approach.

  • Install, configure, and manage your own e-commerce store
  • Extend and customize your...
Instant Mock Testing with PowerMock
Instant Mock Testing with PowerMock

Discover unit testing using PowerMock

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Understand how to test unit code using PowerMock, through hands-on-examples
  • Learn how to avoid unwanted behaviour of code using...
Under Attack
Under Attack

The wording "Under Attack" implies a dangerous situation - one that signifies we are currently under assault. In this book, the Celebrity Experts® showcased are in the vanguard of protecting data and sensitive information under threat - the threat of digital information being made available to unscrupulous sources, and at times...

AWS Certified Advanced Networking Official Study Guide: Specialty Exam
AWS Certified Advanced Networking Official Study Guide: Specialty Exam

The official study guide for the AWS certification specialty exam

The AWS Certified Advanced Networking Official Study Guide – Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking – Specialty Exam. Expert review of AWS fundamentals align with the exam objectives,...

Result Page: 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy