Home | Amazing | Today | Tags | Publishers | Years | Search 
Go Programming Blueprints - Second Edition
Go Programming Blueprints - Second Edition

Build real-world, production-ready solutions in Go using cutting-edge technology and techniques

About This Book

  • Get up to date with Go and write code capable of delivering massive world-class scale performance and availability
  • Learn to apply...
Magento 2 Developer's Guide
Magento 2 Developer's Guide

Harness the power of Magento 2 – The most recent version of the world's favourite e-Commerce platform for your online store

About This Book

  • Set up, configure, and power up your Magento environment from development to production
  • Master the use of Web API to communicate with the...
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Service Design Patterns: Fundamental Design Solutions for SOAP/WSDL and RESTful Web Services
Service Design Patterns: Fundamental Design Solutions for SOAP/WSDL and RESTful Web Services

Web services have been used for many years. In this time, developers and architects have encountered a number of recurring design challenges related to their usage, and have learned that certain service design approaches work better than others to solve certain problems.

 

...
Codes and Cryptography
Codes and Cryptography

This text unifies the concepts of information, codes and cryptography as first studied by Shannon in his seminal papers on communication and secrecy systems. The first five chapters cover the fundamental ideas of information theory, compact encoding of messages and the theory of error-correcting codes. After a discussion of mathematical...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

Python Requests Essentials
Python Requests Essentials

Learn how to integrate your applications seamlessly with web services using Python Requests

About This Book

  • A fast-paced guide that demonstrates the use of Python Requests with the help of examples
  • Learn web scraping with Beautiful Soup and Python Requests libraries
  • ...
Citrix XenDesktop Cookbook - Third Edition
Citrix XenDesktop Cookbook - Third Edition

Over 40 engaging recipes that will help you implement a full-featured XenDesktop® 7.6 architecture and its main satellite components

About This Book

  • Implement, configure, and optimize the migration from a physical to a VDI architecture using XenDesktop 7.6
  • Publish desktops and...
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone...

Microsoft Dynamics CRM 2011 Reporting and Business Intelligence
Microsoft Dynamics CRM 2011 Reporting and Business Intelligence

Everything you need to know to work with reports in Dynamics CRM 2011

Overview

  • Create reports with SQL Reporting Services for CRM
  • Empower your reports with the different Report Wizards and dashboards
  • Troubleshoot and optimize your reports for better performance
...
Web Application Development with Yii 2 and PHP
Web Application Development with Yii 2 and PHP

Fast-track your web application development using the new generation Yii PHP framework

About This Book

  • Implement real-world web application features efficiently using the Yii development framework
  • Each chapter provides micro-examples that build upon each other to create the final...
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy