Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Mastering Cloud Computing: Foundations and Applications Programming
Mastering Cloud Computing: Foundations and Applications Programming

Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won’t live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the...

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Advanced Programming in the UNIX Environment, 3rd Edition
Advanced Programming in the UNIX Environment, 3rd Edition

For more than twenty years, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W. Richard Stevens’ Advanced Programming in the UNIX® Environment . Now, once again, Rich’s colleague Steve...

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

IoT Security Issues
IoT Security Issues

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack...

The SEO Battlefield: Winning Strategies for Search Marketing Programs
The SEO Battlefield: Winning Strategies for Search Marketing Programs

Welcome to the battlefield. Every day, companies ranging from startups to enterprises fight to achieve high search rankings, knowing that previous success can quickly vanish. With this practical guide, you’ll learn how to put search engine optimization (SEO) methodology into practice, including the research, data analysis, and...

Applied Data Mining: Statistical Methods for Business and Industry (Statistics in Practice)
Applied Data Mining: Statistical Methods for Business and Industry (Statistics in Practice)

Data mining can be defined as the process of selection, exploration and modelling of large databases, in order to discover models and patterns. The increasing availability of data in the current information society has led to the need for valid tools for its modelling and analysis. Data mining and applied statistical methods are the...

Business Intelligence: Data Mining and Optimization for Decision Making
Business Intelligence: Data Mining and Optimization for Decision Making

Business intelligence is a broad category of applications andtechnologies for gathering, providing access to, and analyzing datafor the purpose of helping enterprise users make better businessdecisions. The term implies having a comprehensive knowledge of allfactors that affect a business, such as customers, competitors,business partners,...

Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling
Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling

Use the many types of tools required to navigate and maintain a microservice ecosystem. This book examines what is normally a complex system of interconnected services and clarifies them one at a time, first examining theoretical requirements then looking at concrete tools, configuration, and workflows.

Building out these systems...

JavaScript in 24 Hours, Sams Teach Yourself (6th Edition)
JavaScript in 24 Hours, Sams Teach Yourself (6th Edition)
This introduction walks you through a few basic things before you begin reading, including who this book was written for, why it was written, the conventions employed in this book and in the Sams Teach Yourself series, how the content is organized, and the tools you need to create JavaScript.

Who This Book Is For
...
Information Technology Project Management (with Microsoft Project 2010 60 Day Trial CD-ROM)
Information Technology Project Management (with Microsoft Project 2010 60 Day Trial CD-ROM)

Discover exciting "behind-the-scenes" opportunities and challenges in technology today with Schwalbe's unique INFORMATION TECHNOLOGY PROJECT MANAGEMENT, 7E. This one-of-a-kind book demonstrates the principles distinctive to managing information technology (IT) projects that extend well beyond standard project management...

Result Page: 275 274 273 272 271 270 269 268 267 266 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy