Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Algorithm Design Manual
The Algorithm Design Manual
Most of the professional programmers that I've encountered are not well prepared to tackle algorithm
design problems. This is a pity, because the techniques of algorithm design form one of the core practical
technologies of computer science. Designing correct, efficient, and implementable algorithms for realworld
problems is a tricky
...
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Get SQL Server up and running on the Linux operating system and containers. No database professional managing or developing SQL Server on Linux will want to be without this deep and authoritative guide by one of the most respected experts on SQL Server in the industry. Get an inside look at how SQL Server for Linux works through the...
Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
SQL Hacks
SQL Hacks

Whether you're running Access, MySQL, SQL Server, Oracle, or PostgreSQL, this book will help you push the limits of traditional SQL to squeeze data effectively from your database. The book offers 100 hacks -- unique tips and tools -- that bring you the knowledge of experts who apply what they know in the real world to help you...

SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of...
Programming Challenges
Programming Challenges
There are many distinct pleasures associated with computer programming. Craftsmanship
has its quiet rewards, the satisfaction that comes from building a useful object and
making it work. Excitement arrives with the flash of insight that cracks a previously
intractable problem. The spiritual quest for elegance can turn the hacker into
...
Beginning Oracle Application Express 4.2
Beginning Oracle Application Express 4.2

Beginning Oracle Application Express 4.2 introduces version 4.2 of the popular and productive Oracle Application Express development platform. Called APEX for short, the platform enables rapid and easy development of web-based applications that make full use of Oracle Database. The release of APEX 4.2 brings extensive new...

Result Page: 34 33 32 31 30 29 28 27 26 25 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy