Home | Amazing | Today | Tags | Publishers | Years | Search 
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

A computer forensics "how-to" for fighting malicious code and analyzing incidents

With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware,...

Visual C# Game Programming for Teens
Visual C# Game Programming for Teens

Imagine this scenario: You create a hunter character with random stats and hit points and enter the dungeon to begin exploring for treasure. You stumble upon a zombie pacing near a pile of gear and gold! You attack the zombie and it strikes back! You roll 1D20 and score a critical hit! The 20 point die plus dexterity, against the...

Programming Concurrency on the JVM: Mastering Synchronization, STM, and Actors
Programming Concurrency on the JVM: Mastering Synchronization, STM, and Actors

Speed. Aside from caffeine, nothing quickens the pulse of a programmer as much as the blazingly fast execution of a piece of code. How can we fulfill the need for computational speed? Moore’s law takes us some of the way, but multicore is the real future. To take full advantage of multicore, we need to program with concurrency...

Web Analytics Action Hero: Using Analysis to Gain Insight and Optimize Your Business
Web Analytics Action Hero: Using Analysis to Gain Insight and Optimize Your Business
This astounding declaration was made by the former PepsiCo executive and Apple CEO John Sculley, the same visionary responsible for ousting Steve Jobs in 1985. While some traditional marketers might still agree with his statement, today most marketing executives recognize data-driven decisions will shape the future of...
Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

My Dear Reader,

This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting
...

Maintainable JavaScript
Maintainable JavaScript
The professionalization of web development has been a difficult journey because of our disparate beginnings. Even those who end up at large companies such as Yahoo! inevitably began on their own, hacking around. Perhaps you were even “the web guy” at a small company and could do pretty much whatever you...
Managing Enterprise Content: A Unified Content Strategy (2nd Edition) (Voices That Matter)
Managing Enterprise Content: A Unified Content Strategy (2nd Edition) (Voices That Matter)
A unified content strategy is about much more than just content. It’s about how you create content once and how you publish many times from that content. It’s about pulling together the best practices, guidelines, and content structure your organization needs to enable you to rapidly design, build, test, and deliver a...
Pro JavaScript for Web Apps
Pro JavaScript for Web Apps
Client-side web app development has always been the poor cousin to server-side coding. This started because browsers and the devices they run on have been less capable than enterprise-class servers. To provide any kind of serious web app functionality, the server had to do all of the heavy lifting for the browsers, which was pretty...
Starting Strength (2nd edition)
Starting Strength (2nd edition)
Many things have happened since I started the writing of Starting Strength: A Simple and Practical Guide for Coaching Beginners in 2004. As a result of its publication I have had the opportunity to meet and learn from many new people. It is my sincerest hope that the additions to this book that are the direct result of their input...
Hadoop in Practice
Hadoop in Practice

Summary

Hadoop in Practice collects 85 Hadoop examples and presents them in a problem/solution format. Each technique addresses a specific task you'll face, like querying big data using Pig or writing a log file loader. You'll explore each problem step by step, learning both how to build and deploy...

Ancient China and its Enemies: The Rise of Nomadic Power in East Asian History
Ancient China and its Enemies: The Rise of Nomadic Power in East Asian History
In the time of Duke Huan of Ch’i [the position of] the son of Heaven had become humble and weak, while the feudal lords used their energies in attacking [one another]. The Southern Yi and Northern Ti engaged the Central States in battle, and the continued existence of the Central States seemed [to hang by] a thin thread...
The Fantastic Inventions of Nikola Tesla (Lost Science)
The Fantastic Inventions of Nikola Tesla (Lost Science)
While a large portion of the European family has been surging westward during the last three or four hundred years, settling the vast continents of America, another, but smaller, portion has been doing frontier work in the Old World, protecting the rear by beating back the "unspeakable Turk" and reclaiming gradually the...
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy