Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

The DevOps 2.0 Toolkit: Automating the Continuous Deployment Pipeline with Containerized Microservices
The DevOps 2.0 Toolkit: Automating the Continuous Deployment Pipeline with Containerized Microservices

This book is about different techniques that help us architect software in a better and more efficient way with microservices packed as immutable containers, tested and deployed continuously to servers that are automatically provisioned with configuration management tools. It's about fast, reliable and continuous deployments with...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Dictionary of Computer Acronyms and Abbreviations: Plus File Name Extensions (Words R Us Computer Dictionaries) (Volume 2)
Dictionary of Computer Acronyms and Abbreviations: Plus File Name Extensions (Words R Us Computer Dictionaries) (Volume 2)
This Companion Volume to our Dictionary of Computer and Internet Terms (Vol.2) - Dictionary of Computer Acronyms and Abbreviations, has 4,300 terms. It also includes a section on file name extensions with 38,000 entries showing the most commonly used extensions and their association with various software systems. Volume 1 contains over 32,000...
Securing Your Internet Life: A Step By Step Guide to Secure Yourself Online
Securing Your Internet Life: A Step By Step Guide to Secure Yourself Online

It’s a well-known fact that scouring through the online world not just conveys accommodation to the world all in all, however there are numerous things that you can do online today that you couldn't do a few years prior. Not just would you be able to now shop online for all intents and purposes anything that you require, yet you can...

Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

C Programming - A Beginner's Course
C Programming - A Beginner's Course
Comments posted online for C Programming – A Beginner's Course: "The text does a great job of explaining concepts and the examples are pretty good." "It covers a lot of ideas and concepts that are left out of the other beginner books." "This book does such a good job at explaining the fundamentals of the...
C in Depth :: Easy Beginner's To Expert's Guide.
C in Depth :: Easy Beginner's To Expert's Guide.

Essential C Skills-Made Easy–Without Fear!

This C Programming book gives a good start and complete introduction for C Programming for Beginner’s. Learn the all basics and advanced features of C programming in no time from Bestselling...

An Introduction to Programming in Go
An Introduction to Programming in Go
This book is a short, concise introduction to computer programming using the language Go. Designed by Google, Go is a general purpose programming language with modern features, clean syntax and a robust well-documented common library, making it an ideal language to learn as your first programming language....
The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

Linux: The Ultimate Step by Step Guide to Quickly and Easily Learning Linux
Linux: The Ultimate Step by Step Guide to Quickly and Easily Learning Linux
LINUX The Ultimate Step by Step Guide to Quickly and Easily Learning Linux This book is a precise yet comprehensive manual that includes all the tips, secrets and procedures that will help you learn Linux in a fun, fast and easy manner. It is a step-by-step guide that contains an in-depth analysis of contemporary and proven steps that will help...
Cracking the Coding Interview, Fourth Edition: 150 Programming Interview Questions and Solutions
Cracking the Coding Interview, Fourth Edition: 150 Programming Interview Questions and Solutions

Now in the 4th edition, Cracking the Coding Interview gives you the interview preparation you need to get the top software developer jobs. This book provides:

* 150 Programming Interview Questions and Solutions: From binary trees to binary search, this list of 150 questions includes the most common and most useful questions
...

Result Page: 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy