Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming Arduino: Getting Started With Sketches
Programming Arduino: Getting Started With Sketches
Arduino interface boards provide a low-cost, easy-to-use technology to create microcontrollerbased projects. With a little electronics, you can make your Arduino do all sorts of things, from controlling lights in an art installation to managing the power on a solar energy system.

There are many
...
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Are you interested in learning about how to hack systems?

Do you want to learn how to protect yourself from being hacked?

Do you wish to learn the art of ethical hacking?

Do you want to know the secrets techniques that genius hackers use?

Do you want to learn how to protect yourself...

The Sungod's Journey through the Netherworld: Reading the Ancient Egyptian Amduat
The Sungod's Journey through the Netherworld: Reading the Ancient Egyptian Amduat

"The ancient Egyptian sources come alive, speaking to us without seeming alien to our modern ways of thinking. Andreas Schweizer invites us to join the nocturnal voyage of the solar barque and to immerse ourselves, with the 'Great Soul' of the sun, into the darkness surrounding us. Here in the illustrations and texts of the...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Microsoft Windows Identity Foundation Cookbook
Microsoft Windows Identity Foundation Cookbook
I still remember sitting down with my brand new copy of Writing Secure Code by Michael Howard and David LeBlanc. Having moved beyond writing relatively simple intranet web reports, (before the term "Bl" came to embody what at the time we thought was an incredibly innovative way to display call center metrics for managing...
Managing Risk and Information Security: Protect to Enable
Managing Risk and Information Security: Protect to Enable
Newly promoted CISOs rapidly realize that the scope of the position they have taken on is often beyond what they have been prepared for. The nature of securing an enterprise is daunting and overwhelming. There are no simple checklists or roadmaps for success. Many of the technical security skills a CISO has acquired during the early...
Basics of Game Design
Basics of Game Design
The video game industry has grown explosively over the past decade and is now a major provider of home entertainment. Since the North American release of the Nintendo Entertainment System (NES) in 1985, game industry revenues have also grown substantially and, according to the marketing research company NDP Group, grossed...
North Korea: The Struggle Against American Power
North Korea: The Struggle Against American Power
George W. Bush's infamous remark about the 'Axis of Evil' brought North Korea dramatically back into the international spotlight. During the late 1990s relations between North Korea and the US and its allies were on the mend. However, the election of George W. Bush resulted in renewed crisis. The nuclear accord between the two...
Beginning SQL Server 2000 DBA: From Novice to Professional
Beginning SQL Server 2000 DBA: From Novice to Professional
Have you been considering a career change and thinking about becoming a SQL Server DBA (database administrator)? Perhaps you've been given the responsibility oflooking after a SQJ. Server and you aren't quite sure what this really means or where you should start? Maybe you're just interested in finding out what on earth...
Web Analytics Action Hero: Using Analysis to Gain Insight and Optimize Your Business
Web Analytics Action Hero: Using Analysis to Gain Insight and Optimize Your Business
This astounding declaration was made by the former PepsiCo executive and Apple CEO John Sculley, the same visionary responsible for ousting Steve Jobs in 1985. While some traditional marketers might still agree with his statement, today most marketing executives recognize data-driven decisions will shape the future of...
Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

Result Page: 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy