Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HTML5 24-Hour Trainer
HTML5 24-Hour Trainer
Easy-to-follow lessons and training videos for learning HTML5

HTML is the core technology for building web sites; the latest version opens the door to new levels of rich content and dynamic interactivity. This easy-to-follow book-and-DVD package is an ideal introduction to HTML5. Featuring straightforward lessons and...

Beginning Data Science in R: Data Analysis, Visualization, and Modelling for the Data Scientist
Beginning Data Science in R: Data Analysis, Visualization, and Modelling for the Data Scientist
Discover best practices for data analysis and software development in R and start on the path to becoming a fully-fledged data scientist. This book teaches you techniques for both data manipulation and visualization and shows you the best way for developing new software packages for R.

Beginning Data Science in R...
Sudoku Programming with C
Sudoku Programming with C

Sudoku Programming with C teaches you how to write computer programs to solve and generate Sudoku puzzles. This is a practical book that will provide you with everything you need to write your own books of Sudoku Classic and Samurai puzzles. But be warned: after reading it, you'll discover that the puzzles in...

Troubleshooting Java Performance: Detecting Anti-Patterns with Open Source Tools
Troubleshooting Java Performance: Detecting Anti-Patterns with Open Source Tools
With just 30 minutes of troubleshooting, how close can you get to finding the root cause of a Java performance problem? What observability tools would you use? What subsystems would you investigate?

This book is a short curriculum in Java performance tuning for Java server-side developers. It explores one methodical
...
Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Functional Thinking: Paradigm Over Syntax
Functional Thinking: Paradigm Over Syntax

If you’re familiar with functional programming basics and want to gain a much deeper understanding, this in-depth guide takes you beyond syntax and demonstrates how you need to think in a new way. Software architect Neal Ford shows intermediate to advanced developers how functional coding allows you to step back a level of...

ITIL Continual Service Improvement 2011 Edition (Best Management Practices)
ITIL Continual Service Improvement 2011 Edition (Best Management Practices)

The ITIL 2011 Editions have been updated for clarity, consistency, correctness and completeness. Alongside the delivery of consistent, repeatable process activities as part of service quality, ITIL has always emphasized the importance of continual service improvement. Focusing on the process elements involved in identifying and introducing...

Troubleshooting Windows Server with PowerShell
Troubleshooting Windows Server with PowerShell

This book shows you how to use PowerShell to quickly pinpoint, diagnose, and solve problems with your Windows Server environment, reducing the need for external tools, and ensuring you stay up-to-date with PowerShell as it quickly becomes one of the most useful tools in an administrator’s toolkit.

Authors Derek Schauland and...

Get Programming with JavaScript
Get Programming with JavaScript

Summary

Get Programming with JavaScript is a hands-on introduction to programming for readers who have never programmed. You'll be writing your own web apps, games, and programs in no time! Foreword by Remy Sharp.

Purchase of the print book includes a free eBook in PDF,...

Data Mining Using SAS Applications (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Data Mining Using SAS Applications (Chapman & Hall/CRC Data Mining and Knowledge Discovery Series)
Most books on data mining focus on principles and furnish few instructions on how to carry out a data mining project. Data Mining Using SAS Applications not only introduces the key concepts but also enables readers to understand and successfully apply data mining methods using powerful yet user-friendly SAS macro-call files. These methods...
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Python Web Penetration Testing Cookbook
Python Web Penetration Testing Cookbook

Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing

About This Book

  • Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
  • Find the script you need to deal with any...
Result Page: 42 41 40 39 38 37 36 35 34 33 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy