Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C# 4.0 in a Nutshell: The Definitive Reference
C# 4.0 in a Nutshell: The Definitive Reference

What people are saying about C# 4.0 in a Nutshell

"C# 4.0 in a Nutshell is one of the few books I keep on my desk as a quick reference. It is a book I recommend." --Scott Guthrie, Corporate Vice President, .NET Developer Platform, Microsoft Corporation

"A must-read for a concise...

Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Web 2.0: The Business Model
Web 2.0: The Business Model
Web 2.0 is one of the most prominent business models for information systems available today. It brings together technology and social networks, and the interactivity that creates business value.

Web 2.0: The Business Model, an edited volume, is the first reference that integrates the business implications of Web 2.0/3.0, along...

Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Big Breaches: Cybersecurity Lessons for Everyone
Big Breaches: Cybersecurity Lessons for Everyone
Neil and Moudy have written a book that will help us reduce our exposure as a society to future “big breaches” but also to many of the technology risks we face in an increasingly digitized society. They do this not by presenting a “recipe” for success but by making the subject accessible to audiences who...
IP Network Design Guide
IP Network Design Guide

This redbook identifies some of the basic design aspects of IP networks and explains how to deal with them when implementing new IP networks or redesigning existing IP networks. This project focuses on internetwork and transport layer issues such as address and name management, routing, network management, security, load...

Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Managing and Mining Graph Data (Advances in Database Systems)
Managing and Mining Graph Data (Advances in Database Systems)

Managing and Mining Graph Data is a comprehensive survey book in graph data analytics. It contains extensive surveys on important graph topics such as graph languages, indexing, clustering, data generation, pattern mining, classification, keyword search, pattern matching, and privacy. It also studies a number of domain-specific...

What All Network Administrators Know
What All Network Administrators Know

This book is in response to the daily e-mails I receive from my website TheNetworkAdministrator, that ask the question; "What do I need to know to become a network administrator?" Some of you reading this book might find that you have all the qualifications needed, while others may become easily discouraged. Don’t be discouraged....

Professional ASP.NET MVC 1.0 (Wrox Programmer to Programmer)
Professional ASP.NET MVC 1.0 (Wrox Programmer to Programmer)
The ASP.NET MVC framework is designed from the ground up with certain core principles in mind-extensibility, testability, and separation of concerns. The framework adds various conventions into the mix to help drive developers into the "Pit of Success," providing for a streamlined development experience that fits the way the web works....
BlackBerry Enterprise Server for Microsoft® Exchange
BlackBerry Enterprise Server for Microsoft® Exchange
This book for IT professionals and network administrators describes installation, configuration and administration of BlackBerry Enterprise Server for Microsoft Exchange, with detailed information on planning and implementing BlackBerry Enterprise Server deployment. It also provides background information on the BlackBerry architecture, security,...
unlimited object storage image
Result Page: 104 103 102 101 100 99 98 97 96 95 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy