Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

eLearning and Digital Publishing (Computer Supported Cooperative Work)
eLearning and Digital Publishing (Computer Supported Cooperative Work)
Our universities are facing immense pressures from within because of the increase in the ‘publish or perish’ syndrome. There are severe budgetary demands on university libraries attempting to enable access to this increasing avalanche of information. University teaching also needs to prepare graduates for a rapidly changing and...
Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

Lighttpd
Lighttpd

LightTPD is a secure, flexible, and most importantly, light web server designed and optimized for high performance environments. It is open-source and licensed under the revised BSD license. Its event-driven architecture optimized for a large number of parallel connections, its advanced features (FastCGI, CGI, Auth, Output Compression, URL...

A Pattern Approach to Interaction Design
A Pattern Approach to Interaction Design
Textbook summarizing the state of pattern languages in human-computer interaction (HCI), proposing a new pattern-based framework for interactive systems design, drawn from the authors experience from a number of interactive exhibits and public 'kiosk' systems. DLC: Human-computer interaction.

While the subject of design patterns
...
A Brief History of Neoliberalism
A Brief History of Neoliberalism
Neoliberalism--the doctrine that market exchange is an ethic in itself, capable of acting as a guide for all human action--has become dominant in both thought and practice throughout much of the world since 1970 or so. Writing for a wide audience, David Harvey, author of The New Imperialism and The Condition of Postmodernity, here tells the...
Acting in an Uncertain World: An Essay on Technical Democracy (Inside Technology)
Acting in an Uncertain World: An Essay on Technical Democracy (Inside Technology)
Controversies over such issues as nuclear waste, genetically modified organisms, asbestos, tobacco, gene therapy, avian flu, and cell phone towers arise almost daily as rapid scientific and technological advances create uncertainty and bring about unforeseen concerns. The authors of Acting in an Uncertain World argue that political...
The Language of Design: Theory and Computation
The Language of Design: Theory and Computation
The Language of Design: Theory and Computation articulates the theory that there is a language of design. This theory claims that any language of design consists of a set of symbols, a set of relations between the symbols, features that key the expressiveness of symbols, and a set of reality producing information processing behaviors...
Emerging Web Services Technology (Whitestein Series in Software Agent Technologies and Autonomic Computing)
Emerging Web Services Technology (Whitestein Series in Software Agent Technologies and Autonomic Computing)
This book contains initial results of innovative and sometimes controversial emerging Web services research ideas. It covers a wide spectrum of active research areas like Model Driven Engineering for SOA, Mobility and Services, Dynamic Web Service Discovery and Composition, Service Management, and Semantic Web, just to name a few.

As Web...

Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
In todays society the issue of security, understood in the widest context, have become a crucial one. The people of the information age, having instant access to the sources of knowledge and information expect the technology to improve their safety in all respects. That, straightforwardly, leads to the demand for methods, technologies, frameworks...
Python: Create - Modify - Reuse
Python: Create - Modify - Reuse

Python: Create-Modify-Reuse

Aimed at all levels of Python developers who are interested in a task-based way of learning Python development, this hands-on book shows how you can efficiently use Python to create robust, real-world applications. After a brief primer on this object-oriented, interactive programming...

Learning jQuery - Fourth Edition 4th Revised
Learning jQuery - Fourth Edition 4th Revised

In 2005, inspired by pioneers in the field such as Dean Edwards and Simon Willison, John Resig put together a set of functions to make it easy to programmatically find elements on a web page and assign behaviors to them. By the time he first publicly announced his project in January 2006, he had added DOM modification and basic animations. He...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy