Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C# 7 and .NET Core 2.0 Blueprints: Build effective applications that meet modern software requirements
C# 7 and .NET Core 2.0 Blueprints: Build effective applications that meet modern software requirements

Leverage the features of C# 7 and .NET core 2.0 to build real-world .NET core applications

Key Features

  • See how to incorporate Entity Framework Core to build ASP .NET core MVC application
  • Get hands-on SignalR and NuGet packages
  • Work with Reactive...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Developer Testing: Building Quality into Software (Addison-Wesley Signature Series (Cohn))
Developer Testing: Building Quality into Software (Addison-Wesley Signature Series (Cohn))

How do successful agile teams deliver bug-free, maintainable software—iteration after iteration? The answer is: By seamlessly combining development and testing. On such teams, the developers write testable code that enables them to verify it using various types of...

Python Unlocked
Python Unlocked

Key Features

  • Write smarter, bug-free, high performance code with minimal effort
  • Uncover the best tools and options available to Python developers today
  • Deploy decorators, design patters, and various optimization techniques to use Python 3.5 effectively

Book...

Ruby in Practice
Ruby in Practice
Ruby in Practice increases your productivity by showing you specific Ruby techniques you can use in your projects. The book offers detailed strategies for using Ruby in a large-scale environment. You'll see concrete examples of integration, messaging, web development, and databases, all presented in a clear Problem/Solution format. This...
Trojans, Worms, and Spyware, First Edition : A Computer Security Professional's Guide to Malicious Code
Trojans, Worms, and Spyware, First Edition : A Computer Security Professional's Guide to Malicious Code
One of the biggest headaches that comes along with networked and Internetconnected
computers is the absolute requirement of dealing with malicious
code attacks. There is no choice; if your systems are not equipped in some way
with antivirus protection, sooner or later some bug will eat them. There is also
very little to be
...
Programming C#
Programming C#
C# is designed from the ground up for development on Microsoft's new .NET framework. As such, it's a high-performance language that's simple, safe, object-oriented, and Internet-centric. Programming C# teaches this new language in a way that experienced programmers will appreciate--by grounding its applications firmly in the context of...
Solaris 8: The Complete Reference
Solaris 8: The Complete Reference
Clients often ask why we choose Solaris as an operating environment. Is it a decision based on price? Is it an attraction to the latest gizmo features, each with its own four-letter acronym? Do we have a cozy arrangement with Sun Microsystems to promote their operating system? The answer to each of these questions is no, no, NO!  ...
Arduino Robotics (Technology in Action)
Arduino Robotics (Technology in Action)

This book will show you how to use your Arduino to control a variety of different robots, while providing step-by-step instructions on the entire robot building process. You'll learn Arduino basics as well as the characteristics of different types of motors used in robotics. You also discover controller methods and failsafe...

Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
15 Dangerously Mad Projects for the Evil Genius
15 Dangerously Mad Projects for the Evil Genius

UNLEASH YOUR INNER MAD SCIENTIST!

"Wonderful. I learned a lot reading the detailed but easy to understand instructions."--BoingBoing

This wickedly inventive guide explains how to design and build 15 fiendishly fun electronics projects. Filled with photos and illustrations, 15 Dangerously Mad Projects for...

Pro JavaScript for Web Apps
Pro JavaScript for Web Apps
Client-side web app development has always been the poor cousin to server-side coding. This started because browsers and the devices they run on have been less capable than enterprise-class servers. To provide any kind of serious web app functionality, the server had to do all of the heavy lifting for the browsers, which was pretty...
Result Page: 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy