Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering,...
Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining addresses an issue unfortunately ignored by most authorities on data mining: data preparation. Thanks largely to its perceived difficulty, data preparation has traditionally taken a backseat to the more alluring question of how best to extract meaningful knowledge. But without adequate preparation of your...
Professional ASP.NET MVC 1.0 (Wrox Programmer to Programmer)
Professional ASP.NET MVC 1.0 (Wrox Programmer to Programmer)
The ASP.NET MVC framework is designed from the ground up with certain core principles in mind-extensibility, testability, and separation of concerns. The framework adds various conventions into the mix to help drive developers into the "Pit of Success," providing for a streamlined development experience that fits the way the web works....
Java EE 6 with GlassFish 3 Application Server
Java EE 6 with GlassFish 3 Application Server

This book is a practical guide with a very user-friendly approach. It aims to speed up the reader in Java EE 6 development. All major Java EE 6 APIs and the details of the GlassFish 3 server are covered followed by examples of its use. If you are a Java developer and wish to become proficient with Java EE 6, then this book is for you. You are...

Local Area High Speed Networks (MTP)
Local Area High Speed Networks (MTP)
There is a great deal of change happening in the technology being used for local networks. As Web intranets have driven bandwidth needs through the ceiling, inexpensive Ethernet NICs and switches have come into the market. As a result, many network professionals are interested in evaluating these new technologies for implementation consideration....
Principles & Practice of Pain Management
Principles & Practice of Pain Management
The best textbook on pain management! This comprehensive resource covers every aspect of diagnosing and treating specific pain conditions and syndromes. Features a concise introduction to basic concepts in pain management, plus an expanded section on evaluation and assessment techniques.

Harvard Medical
...
Beginning iOS Application Development with HTML and JavaScript (Wrox Programmer to Programmer)
Beginning iOS Application Development with HTML and JavaScript (Wrox Programmer to Programmer)
THE AMAZING SUCCESS OF THE IPHONE and iPad over the past four years has proven that application developers are now smack deep in a brave new world of sophisticated, multifunctional mobile applications. No longer do applications and various media need to live in separate silos. Instead, mobile web-based applications can bring...
IT Portfolio Management: Unlocking the Business Value of Technology
IT Portfolio Management: Unlocking the Business Value of Technology
This book provides a pragmatic, step-by-step road map, describing IT portfolio
management and its major elements. Chapter 1 provides an overview of IT
portfolio management. Chapter 2 describes the planning aspects of IT portfolio
management. It explains the IT portfolio management maturity model and the
key people, process, and
...
Goldfrank's Toxicologic Emergencies
Goldfrank's Toxicologic Emergencies
The #1 reference in the field for the last quarter of a century, Goldfrank's Toxicologic Emergencies, Eighth Edition, has been completely updated to equip emergency physicians with today's most authoritative guide to clinical toxicology. The book presents unsurpassed coverage of all aspects of toxicologic emergencies_from pharmacology and clinical...
Hackers: Heroes of the Computer Revolution
Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...
6LoWPAN: The Wireless Embedded Internet
6LoWPAN: The Wireless Embedded Internet

"It is stunningly thorough and takes readers meticulously through the design, con?guration and operation of IPv6-based, low-power, potentially mobile radio-based networking." Vint Cerf, Vice President and Chief Internet Evangelist, Google

This book provides a complete overview of IPv6 over Low Power Wireless...

Using CiviCRM
Using CiviCRM

Donald Lobo, Michal Mach, and I started CiviCRM almost six years ago. Back then, open source software had gained traction in the operating system arena, but the idea of an open source application designed from the ground up to meet the needs of non-profits and other civic sector organizations was pretty radical. We were convinced that there...

unlimited object storage image
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy