Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cracking the Coding Interview, Fourth Edition: 150 Programming Interview Questions and Solutions
Cracking the Coding Interview, Fourth Edition: 150 Programming Interview Questions and Solutions

Now in the 4th edition, Cracking the Coding Interview gives you the interview preparation you need to get the top software developer jobs. This book provides:

* 150 Programming Interview Questions and Solutions: From binary trees to binary search, this list of 150 questions includes the most common and most useful questions
...

Damage and Failure of Composite Materials
Damage and Failure of Composite Materials

Understanding damage and failure of composite materials is critical for reliable and cost-effective engineering design. Bringing together materials mechanics and modeling, this book provides a complete guide to damage, fatigue and failure of composite materials. Early chapters focus on the underlying principles governing composite damage,...

Networking (2nd Edition) (Networking Technology)
Networking (2nd Edition) (Networking Technology)

This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical...

Penetration Tester's Open Source Toolkit
Penetration Tester's Open Source Toolkit
This is the first fully integrated Penetration Testing book and bootable Linux CD containing the Auditor Security Collection which includes over 300 of the most effective and commonly used open source attack and penetration testing tools. This powerful tool kit and authoritative reference is written by the security industry's foremost...
Sniffer Pro Network Optimization and Troubleshooting Handbook
Sniffer Pro Network Optimization and Troubleshooting Handbook
Imagine it is 4:00 P.M. and you are sitting at your desk with three books spread
across your lap.You are hard at work trying to figure out why performance on
your company’s file server has dropped sharply over the past eight hours. Of the
200 users in your company, nearly 100 of them have called to complain about
slow
...
Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Instant Kali Linux
Instant Kali Linux

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...

Hacker Debugging Uncovered (Uncovered series)
Hacker Debugging Uncovered (Uncovered series)

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of...

iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
Certain technologies bring out everyone's hidden geek, and iPhone did the moment it was released. Even though Apple created iPhone as a closed device, tens of thousands of developers bought them with the expressed purpose of designing and running third-party software. In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the...
Black Hat: Misfits, Criminals, and Scammers in the Internet Age
Black Hat: Misfits, Criminals, and Scammers in the Internet Age

Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle. Written by internationally recognized author, John Biggs, this book is an ideal read...

Advertising on Google: The High Performance Cookbook
Advertising on Google: The High Performance Cookbook

Cracking pay-per-click on Google can increase your visitor numbers and profits. Here are over 120 practical recipes to help you set up, optimize and manage your Adwords campaign with step-by-step instructions.

Overview

  • Set up your Adwords account and track results beyond the click
  • Create...
Minimum Reinforcement in Concrete Members (European Structural Integrity Society)
Minimum Reinforcement in Concrete Members (European Structural Integrity Society)
Hardbound. The ESIS-Technical Committee 9 on Concrete was established in 1990 and has met seven times. A proposal was put to European and extra-European laboratories entitled "Scale effects and transitional failure phenomena of reinforced concrete beams in flexure" which lead to several positive responses.

The central topic discussed...

Result Page: 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy