Home | Amazing | Today | Tags | Publishers | Years | Search 
Securing PHP Web Applications
Securing PHP Web Applications
If you’re reading this, we know two things about you: First, you write PHP applications that run online. Second, you’re not a hard-core security guru. In fact, you’re probably holding this book right now because other security books left you with more questions than you started with, or because this is the first time you’ve...
Programming .NET Compact Framework 3.5 (2nd Edition)
Programming .NET Compact Framework 3.5 (2nd Edition)
WE FEEL PRETTY FORTUNATE. During the past three decades, we have traveled the world teaching programmers what we know. Between the two of us, we have led hundreds of classes and taught thousands of professional programmers. We enjoy working with the people who are inventing the future, andwehave been fortunate enough to have been at the cutting...
TOAD Handbook (2nd Edition)
TOAD Handbook (2nd Edition)

TOAD Handbook is a guide for developing Oracle applications and administering Oracle databases with TOAD. Starting with installation and configuration, the book covers the TOAD SQL editors in depth, including dozens of helpful, undocumented features. Later chapters discuss reporting and exporting data and using several add-on tools designed to...

Python Essential Reference (4th Edition)
Python Essential Reference (4th Edition)
Python Essential Reference is the definitive reference guide to the Python programming language — the one authoritative handbook that reliably untangles and explains both the core Python language and the most essential parts of the Python library.

Designed for the professional programmer, the book...

PDF Reference: Version 1.4 (3rd Edition)
PDF Reference: Version 1.4 (3rd Edition)

The official guide to the Portable Document Format.

This book details the most current specification of Adobe Systems' Portable Document Format (PDF), the de facto standard for electronic information exchange. PDF enables documents created on any platform or with any application to be reliably viewed and printed anywhere. More...

Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Quantum Circuit Simulation
Quantum Circuit Simulation

Quantum Circuit Simulation covers the fundamentals of linear algebra and introduces basic concepts of quantum physics needed to understand quantum circuits and algorithms. It requires only basic familiarity with algebra, graph algorithms and computer engineering. After introducing necessary background, the authors describe key simulation...

Elements of Programming
Elements of Programming
Elements of Programming provides a different understanding of programming than is presented elsewhere. Its major premise is that practical programming, like other areas of science and engineering,must be based on a solid mathematical foundation. The book shows that algorithms implemented in a real programming language,...
Software Engineering (6th Edition)
Software Engineering (6th Edition)
The new edition of this best-selling book provides a comprehensive discussion of software engineering techniques and shows how they can be applied in practical software projects. This book features new coverage of the software process and software process technology, system integration, requirements management, and risk analysis, as well as new...
User Interface Design: A Software Engineering Perspective
User Interface Design: A Software Engineering Perspective
When you design the user interface to a computer system, you decide which screens the system will show, what exactly will be in each screen and how it will look. You also decide what the user can click on and what happens when he does so, plus all the other details of the user interface. It is the designer’s responsibility that the system has...
Scaling Oracle8i(TM): Building Highly Scalable OLTP System Architectures
Scaling Oracle8i(TM): Building Highly Scalable OLTP System Architectures
This is a book about getting the most out of Oracle8i on UNIX systems. While many people understand how to administrate Oracle and UNIX, far fewer understand the issues and workings of the software and hardware, thus limiting the scalability of the system. This book aims to open up this essential information, enabling the reader to build faster,...
Practical Cryptology and Web Security
Practical Cryptology and Web Security
Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information. This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web.
...
Result Page: 87 86 85 84 83 82 81 80 79 78 77 76 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy