Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)

Even bad code can function. But if code isn’t clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn’t have to be that way.

Noted software expert Robert C. Martin presents a revolutionary paradigm with
...

Internet of Things and Data Analytics Handbook
Internet of Things and Data Analytics Handbook

This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view.

Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing...

Reporting with Microsoft SQL Server 2012 (Professional Experience Distilled)
Reporting with Microsoft SQL Server 2012 (Professional Experience Distilled)

Learn to quickly create reports in SSRS and Power View as well as understand the best use of each reporting tool

Overview

  • Empowers a highly visual design experience
  • Increase productivity and proactive intelligence through operational or ad hoc reports
  • Reporting with Microsoft...
Dependency Injection
Dependency Injection
Dependency Injection is an in-depth guide to the current best practices for using the Dependency Injection pattern-the key concept in Spring and the rapidly-growing Google Guice. It explores Dependency Injection, sometimes called Inversion of Control, in fine detail with numerous practical examples. Developers will learn to apply important...
Learning Ionic - Build Hybrid Mobile Applications with HTML5
Learning Ionic - Build Hybrid Mobile Applications with HTML5

Key Features

  • Create hybrid mobile applications by combining the capabilities of Ionic, Cordova, and AngularJS
  • Reduce the time to market your application using Ionic, that helps in rapid application development
  • Detailed code examples and explanations, helping you get up and running with Ionic...
Introduction to Digital Professional Mobile Radio (Artech House Mobile Communications Library)
Introduction to Digital Professional Mobile Radio (Artech House Mobile Communications Library)
Offering unique insight from the author's years of experience working with this technology, the book presents a comparison of the properties of conventional analogue and new digital PMR systems.

This practical new book is written for mobile communication professionals who are involved in the planning, design, testing,
...
Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking
Windows Server 2012 R2 Pocket Consultant Volume 2: Storage, Security, & Networking

Portable and precise, this pocket-sized guide delivers ready answers for administering storage, security, and networking features in Windows Server 2012 R2. Zero in on core tasks through quick-reference tables, instructions, and lists. You'll get the focused information you need to save time and get the job done - whether at your desk or...

Electronics For Dummies
Electronics For Dummies

Begin having fun with electronics projects right away

Explore the basic concepts of electronics, build your electronics workbench, and create cool projects

Wish you could fix that faulty doorbell, hook up a motion detector, or maybe build your very own robot? This book will really get you charged up! It won't make...

Clojure for Java Developers
Clojure for Java Developers

Key Features

  • Write apps for the multithreaded world with Clojure's flavor of functional programming
  • Discover Clojure's features and advantages and use them in your existing projects
  • The book is designed so that you'll be able put to use your existing skills and software knowledge...
Result Page: 137 136 135 134 133 132 131 130 129 128 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy