Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming with Microsoft Visual Basic 2012
Programming with Microsoft Visual Basic 2012

PROGRAMMING WITH MICROSOFT VISUAL BASIC 2012, 6E by best-selling author Diane Zak is the ideal choice for your introduction to programming. Readers learn to master the basics of effective programming as they work through a wealth of hands-on applications in this book's engaging real-world setting. Numerous learning features address...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
Neural Networks and Pattern Recognition
Neural Networks and Pattern Recognition
This book is one of the most up-to-date and cutting-edge texts available on the rapidly growing application area of neural networks. Neural Networks and Pattern Recognition focuses on the use of neural networksin pattern recognition, a very important application area for neural networks technology. The contributors are widely known...
Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko has been writing columns for the computer trade press and championing database programming techniques and ANSI/ISO standards via his newsgroup activity for 20 years.

In this complete revision and expansion of his first SQL Puzzles book, he challenges you with his trickiest puzzlesand then helps solve them with a variety of
...
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Computational Studies of Human Motion: Part 1, Tracking and Motion Synthesis
Computational Studies of Human Motion: Part 1, Tracking and Motion Synthesis
Computational Studies of Human Motion: Part 1, Tracking and Motion Synthesis reviews methods for kinematic tracking of the human body in video. The review confines itself to the earlier stages of motion, focusing on tracking and motion synthesis. There is an extensive discussion of open issues. The authors identify some puzzling phenomena...
The Official ScratchJr Book: Help Your Kids Learn to Code
The Official ScratchJr Book: Help Your Kids Learn to Code

ScratchJr is a free, introductory computer programming language that runs on iPads, Android tablets, Amazon tablets, and Chromebooks. Inspired by Scratch, the wildly popular programming language used by millions of children worldwide, ScratchJr helps even younger kids create their own playful animations, interactive stories, and dynamic...

Quantitative MRI of the Brain: Measuring Changes Caused by Disease
Quantitative MRI of the Brain: Measuring Changes Caused by Disease

This book was conceived one balmy March evening on the banks of the river Brisbane, in Queensland, Australia, where I had just arrived for a sabbatical, and it became clear that the traditions of measurement science and MRI should meet. The notion of a guide, a cook-book, for quantitative MRI (qMR) techniques took seed, and attained its own...

Lossless Compression Handbook (Communications, Networking and Multimedia)
Lossless Compression Handbook (Communications, Networking and Multimedia)
Compression schemes can be divided into two major classes: lossless compression schemes and lossy compression schemes. Data compressed using lossless compression schemes can be recovered exactly, while lossy compression introduces some loss of information in the reconstruction.

While the first modern compression scheme, Huffman coding,
...
Weird Science: 40 Strange-Acting, Bizarre-Looking, and Barely Believable Activities for Kids
Weird Science: 40 Strange-Acting, Bizarre-Looking, and Barely Believable Activities for Kids
Discover the weird science behind the ickiest, wackiest, most unusual things ever to exist!

Would you like to make your own slime, discover how lava lamps work, or learn how materials decompose?
Have you ever heard about ball lightning or the Aurora Borealis on the news and wondered what the reporter was talking about?
Are
...

Reporting with Microsoft SQL Server 2012 (Professional Experience Distilled)
Reporting with Microsoft SQL Server 2012 (Professional Experience Distilled)

Learn to quickly create reports in SSRS and Power View as well as understand the best use of each reporting tool

Overview

  • Empowers a highly visual design experience
  • Increase productivity and proactive intelligence through operational or ad hoc reports
  • Reporting with Microsoft...
Result Page: 53 52 51 50 49 48 47 46 45 44 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy