Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from...
ALIEN Thinking: The Unconventional Path to Breakthrough Ideas
ALIEN Thinking: The Unconventional Path to Breakthrough Ideas
How do people come up with truly original ideas? The answer is to think outside the box—way outside.
 
For the past decade, Cyril Bouquet, Jean-Louis Barsoux, and Michael Wade, professors of innovation and strategy at IMD Business School, have studied inventors, scientists, doctors, entrepreneurs, and
...
Professional Windows PowerShell Programming: Snapins, Cmdlets, Hosts and Providers
Professional Windows PowerShell Programming: Snapins, Cmdlets, Hosts and Providers
Welcome to Professional Windows PowerShell Programming.

Way back in 2003, I attended a talk at a conference center at Microsoft by some engineers from the Microsoft Management Console team who were giving a demonstration of a prototype enhancement to MMC. The prototype was one of the early murmurs of Microsoft’s response to the
...
VMware vSphere PowerCLI Reference: Automating vSphere Administration
VMware vSphere PowerCLI Reference: Automating vSphere Administration

The book is, of course, primarily targeted at administrators of vSphere environments who want to automate tasks. But the subjects that we discuss in the book cover so many aspects of the management of a VMware vSphere environment that everyone who comes into contact with a VMware vSphere environment will be able to pick up something...

MariaDB and MySQL Common Table Expressions and Window Functions Revealed
MariaDB and MySQL Common Table Expressions and Window Functions Revealed

Walk away from old-fashioned and cumbersome query approaches and answer your business intelligence questions through simple and powerful queries built on common table expressions (CTEs) and window functions. These new features in MariaDB and MySQL help you to write queries without having to wade through a quagmire of brittle self-joins and...

Access 2016 Bible
Access 2016 Bible

Master database creation and management

Access 2016 Bible is your, comprehensive reference to the world's most popular database management tool. With clear guidance toward everything from the basics to the advanced, this go-to reference helps you take advantage of everything Access 2016 has to offer. Whether...

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad...
Hands-On Design Patterns with React Native: Proven techniques and patterns for efficient native mobile development with JavaScript
Hands-On Design Patterns with React Native: Proven techniques and patterns for efficient native mobile development with JavaScript

Learn how to write cross platform React Native code by using effective design patterns in the JavaScript world. Get to know industry standard patterns as well as situational patterns. Decouple your application with these set of “Idea patterns”.

Key Features

  • Mobile development...
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging

The Workshop on Medical Computer Vision (MICCAI-MCV 2010) was held in conjunction with the 13th International Conference on Medical Image Computing and Computer – Assisted Intervention (MICCAI 2010) on September 20, 2010 in Beijing, China. The one-day workshop focused on recognition techniques and applications in medical imaging. The...

Engineering and Managing Software Requirements
Engineering and Managing Software Requirements
Requirements engineering is the process by which the requirements for software systems are gathered, analyzed, documented, and managed throughout their complete lifecycle. Traditionally it has been concerned with technical goals for, functions of, and constraints on software systems. Aurum and Wohlin, however, argue that it is no longer appropriate...
Essential SNMP, Second Edition
Essential SNMP, Second Edition

Simple Network Management Protocol (SNMP) provides a "simple" set of operations that allows you to more easily monitor and manage network devices like routers, switches, servers, printers, and more. The information you can monitor with SNMP is wide-ranging--from standard items, like the amount of traffic flowing...

unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy