Home | Amazing | Today | Tags | Publishers | Years | Search 
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Learn Ionic 2: Develop Multi-platform Mobile Apps
Learn Ionic 2: Develop Multi-platform Mobile Apps

Explore key scenarios required for building quality Ionic apps quickly and easily and bring them to the iOS and Android mobile ecosystem.

Learn Ionic 2 explains various techniques to quickly integrate third-party back end systems. With this short guide, you'll benefit from practical examples of...

VMware Horizon 6 Desktop Virtualization Solutions
VMware Horizon 6 Desktop Virtualization Solutions

Plan, design, and secure your virtual desktop environments with VMware Horizon 6 View

About This Book

  • Design a successful solution to deliver Windows desktops and applications as a service
  • Provide redundancy for components and design a backup solution and disaster recovery plan to protect...
Web Application Development with Yii 2 and PHP
Web Application Development with Yii 2 and PHP

Fast-track your web application development using the new generation Yii PHP framework

About This Book

  • Implement real-world web application features efficiently using the Yii development framework
  • Each chapter provides micro-examples that build upon each other to create the final...
Android 6 Essentials
Android 6 Essentials

Design, build, and create your own applications using the full range of features available in Android 6

About This Book

  • Learn how to utilize the robust features of Android 6 to design, develop, and publish better Android applications
  • Get useful guidance on creating new apps or migrating...
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

Microsoft Dynamics CRM 2011 Reporting and Business Intelligence
Microsoft Dynamics CRM 2011 Reporting and Business Intelligence

Everything you need to know to work with reports in Dynamics CRM 2011

Overview

  • Create reports with SQL Reporting Services for CRM
  • Empower your reports with the different Report Wizards and dashboards
  • Troubleshoot and optimize your reports for better performance
...
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone...

Citrix XenDesktop Cookbook - Third Edition
Citrix XenDesktop Cookbook - Third Edition

Over 40 engaging recipes that will help you implement a full-featured XenDesktop® 7.6 architecture and its main satellite components

About This Book

  • Implement, configure, and optimize the migration from a physical to a VDI architecture using XenDesktop 7.6
  • Publish desktops and...
Python Requests Essentials
Python Requests Essentials

Learn how to integrate your applications seamlessly with web services using Python Requests

About This Book

  • A fast-paced guide that demonstrates the use of Python Requests with the help of examples
  • Learn web scraping with Beautiful Soup and Python Requests libraries
  • ...
The Definitive Guide to AdonisJs: Building Node.js Applications with JavaScript
The Definitive Guide to AdonisJs: Building Node.js Applications with JavaScript

Learn everything you need to master the AdonisJs framework, including topics such as interacting with a database, rendering templates, writing asynchronous code, and hosting sites with SSL. Along the way, you’ll see how to build a commerce application, which lists products and allows shoppers to register and purchase those...

Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity

Create simple to advanced shell scripts and enhance your system functionality with effective recipes

Key Features

  • Automate tedious and repetitive tasks
  • Create several novel applications ranging from a simple IRC logger to a Web Scraper
  • Manage your system...
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy