Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
50 Things to Know About Yoga: A Yoga Book for Beginners
50 Things to Know About Yoga: A Yoga Book for Beginners

Do you want to try some yoga poses? Would you like to know what all things you’ll need to attend a yoga class? Are you excited to learn which yoga style is right for you? If you answered yes to any of these questions, then this 50 Things To Know book is for you. 50 Things To Know About Yoga by Author Sushmita Choudhury...

Building Progressive Web Applications with Vue.js: Reliable, Fast, and Engaging Apps with Vue.js
Building Progressive Web Applications with Vue.js: Reliable, Fast, and Engaging Apps with Vue.js
Obtain all the necessary tools for developing a progressive web application (PWA) with Vue.js, a modern JavaScript framework. You’ll see how PWAs behave like a regular responsive website and have a similar structure to that of a web application, but feel like a native mobile app. Along the way you’ll take advantage of Vue.js...
Simplifying JavaScript: Writing Modern JavaScript with ES5, ES6, and Beyond
Simplifying JavaScript: Writing Modern JavaScript with ES5, ES6, and Beyond

The best modern JavaScript is simple, readable, and predictable. Learn to write modern JavaScript not by memorizing a list of new syntax, but with practical examples of how syntax changes can make code more expressive. Starting from variable declarations that communicate intention clearly, see how modern principles can improve all...

Hacking: How to Hack Computers, Basic Security and Penetration Testing
Hacking: How to Hack Computers, Basic Security and Penetration Testing

Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught?

Download Hacking to discover everything you need to know about hacking.

Step by step to increase your hacking skill set. Learn how to penetrate computer...

Differential Equations For Dummies
Differential Equations For Dummies
Power your way through ordinary and singular points

Understand differential equations through practical tips and examples

Do differential equations cause you distress? No worries! This friendly guide explains this intimidating subject in plain English, walking you step by step through all...

Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition

Delve into neural networks, implement deep learning algorithms, and explore layers of data abstraction with the help of TensorFlow.

Key Features

  • Learn how to implement advanced techniques in deep learning with Google's brainchild, TensorFlow
  • Explore deep neural...
Practical Node.js: Building Real-World Scalable Web Apps
Practical Node.js: Building Real-World Scalable Web Apps

Learn how to build a wide range of scalable real-world web applications using a professional development toolkit. If you already know the basics of Node.js, now is the time to discover how to bring it to production level by leveraging its vast ecosystem of packages.With this book, you'll work with a varied collection of standards...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Functional Programming in C++: How to improve your C++ programs using functional techniques
Functional Programming in C++: How to improve your C++ programs using functional techniques
Summary

Functional Programming in C++ teaches developers the practical side of functional programming and the tools that C++ provides to develop software in the functional style. This in-depth guide is full of useful diagrams that help you understand FP concepts and begin to think functionally.

...
tmux: Productive Mouse-Free Development
tmux: Productive Mouse-Free Development

Your mouse is slowing you down. The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. Learn how to customize, script, and leverage tmux's unique abilities and keep your fingers on...

Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions
Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions

Understand the nuts and bolts of Blockchain, its different flavors with simple use cases, and cryptographic fundamentals. You will also learn some design considerations that can help you build custom solutions.

Beginning Blockchain is a beginner’s guide to understanding the core concepts of...

unlimited object storage image
Result Page: 287 286 285 284 283 282 281 280 279 278 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy