Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Foundations of Python Network Programming
Foundations of Python Network Programming

Foundations of Python Network Programming, Third Edition, covers all of the classic topics found in the second edition of this book, including network protocols, network data and errors, email, server architecture, and HTTP and web applications, plus updates for Python 3.

Some of the new topics in this edition...

Designing Digital Games: Create Games with Scratch! (Dummies Junior)
Designing Digital Games: Create Games with Scratch! (Dummies Junior)
The easy way for kids to get started with video game design

Is your youngster a designer at heart? Read on! Designing Digital Games helps children apply their design skills to video game design using Scratch—and this book! Introducing simple programming concepts over the course of three easy-to-follow projects,...

Pro JSP, Third Edition
Pro JSP, Third Edition

Simpler, faster, easier dynamic website development based on new additions to an established and proven technology—that's what JavaServer Pages (JSP) 2.0 is all about. Pro JSP, Third Edition is the most comprehensive guide and reference to JSP 2.0 yet. It equips you with the tools, techniques, and understanding you need to develop web...

Hardening Linux
Hardening Linux

Take a proactive approach to Enterprise Linux security by implementing preventive measures against attacks—before they occur. Written by a team of Linux security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Features include examples using Red...

Upheaval: Turning Points for Nations in Crisis
Upheaval: Turning Points for Nations in Crisis
A "riveting and illuminating" Bill Gates Summer Reading pick about how and why some nations recover from trauma and others don't (Yuval Noah Harari), by the Pulitzer Prize-winning author of the landmark bestseller Guns, Germs, and Steel.

In his international...
Beginning Oracle Application Express 4.2
Beginning Oracle Application Express 4.2

Beginning Oracle Application Express 4.2 introduces version 4.2 of the popular and productive Oracle Application Express development platform. Called APEX for short, the platform enables rapid and easy development of web-based applications that make full use of Oracle Database. The release of APEX 4.2 brings extensive new...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
The Algorithm Design Manual
The Algorithm Design Manual
Most of the professional programmers that I've encountered are not well prepared to tackle algorithm
design problems. This is a pity, because the techniques of algorithm design form one of the core practical
technologies of computer science. Designing correct, efficient, and implementable algorithms for realworld
problems is a tricky
...
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand

Maritime security is of vital importance to Australia and New Zealand as both countries depend on maritime transport for their economic survival. Since the events of September 11th 2001, significant questions have been raised as to whether Australia and New Zealand are adequately prepared for the consequences of a major disruption to...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy