Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
2019 Nelson's Pediatric Antimicrobial Therapy
2019 Nelson's Pediatric Antimicrobial Therapy
This best-selling and widely used resource on pediatric antimicrobial therapy provides instant access to reliable, up-to-the-minute recommendations for treatment of all infectious diseases in children.

For each disease, the authors provide a commentary to help health care providers select the best of all
...
Research Methods in Legal Translation and Interpreting: Crossing Methodological Boundaries (Law, Language and Communication)
Research Methods in Legal Translation and Interpreting: Crossing Methodological Boundaries (Law, Language and Communication)

The field of Legal translation and interpreting has strongly expanded over recent years. As it has developed into an independent branch of Translation Studies, this book advocates for a substantiated discussion of methods and methodology, as well as knowledge about the variety of approaches actually applied in the field. It is argued...

Becoming a Better Programmer: A Handbook for People Who Care About Code
Becoming a Better Programmer: A Handbook for People Who Care About Code

If you’re passionate about programming and want to get better at it, you’ve come to the right source. Code Craft author Pete Goodliffe presents a collection of useful techniques and approaches to the art and craft of programming that will help boost your career and your well-being.

Goodliffe presents sound...

Software Design (2nd Edition)
Software Design (2nd Edition)
Software design is a multi-disciplinary activity that develops tools through effective communication of ideas and the use of engineering practices. This text provides an overview and perspective of software design within the context of software development and also of more general thinking about design issues. It examines the nature of design...
Hands-On Data Structures and Algorithms with JavaScript: Write efficient code that is highly performant, scalable, and easily testable using JavaScript
Hands-On Data Structures and Algorithms with JavaScript: Write efficient code that is highly performant, scalable, and easily testable using JavaScript

Increase your productivity by implementing complex data structures and algorithms using JavaScript

Key Features

  • A step by step guide, which will provide you with a thorough discussion on the analysis and design of fundamental JavaScript data structures
  • Get a better...
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Machine Learning with the Raspberry Pi: Experiments with Data and Computer Vision (Technology in Action)
Machine Learning with the Raspberry Pi: Experiments with Data and Computer Vision (Technology in Action)

Using the Pi Camera and a Raspberry Pi board, expand and replicate interesting machine learning (ML) experiments.  This book provides a solid overview of ML and a myriad of underlying topics to further explore. Non-technical discussions temper complex technical explanations to make the hottest and most complex topic in the...

Scene of the Cybercrime: Computer Forensics Handbook
Scene of the Cybercrime: Computer Forensics Handbook

"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and
...

Expert Oracle Indexing and Access Paths: Maximum Performance for Your Database
Expert Oracle Indexing and Access Paths: Maximum Performance for Your Database

Speed up the execution of important database queries by making good choices about which indexes to create. Choose correct index types for different scenarios. Avoid indexing pitfalls that can actually have indexes hurting performance rather than helping. Maintain indexes so as to provide consistent and predictable query response over...

Grammar for Teachers: A Guide to American English for Native and Non-Native Speakers
Grammar for Teachers: A Guide to American English for Native and Non-Native Speakers
The purpose of Grammar for Teachers is to encourage readers to develop a solid understanding of the use and function of grammatical structures in American English. It approaches grammar from a descriptive rather than a prescriptive approach; however, throughout Grammar for Teachers differences between formal and informal language,...
Lectures in Game Theory for Computer Scientists
Lectures in Game Theory for Computer Scientists

Game playing is a powerful metaphor that fits many situations where interaction between autonomous agents plays a central role. Numerous tasks in computer science, such as design, synthesis, verification, testing, query evaluation, planning, etc. can be formulated in game-theoretic terms. Viewing them abstractly as games reveals the...

Result Page: 56 55 54 53 52 51 50 49 48 47 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy