Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Microsoft Outlook and Microsoft Exchange 2003, Third Edition
Programming Microsoft Outlook and Microsoft Exchange 2003, Third Edition

Extend your organization’s productivity and reach by building next-generation collaboration solutions with Exchange Server 2003. Create rich, collaborative messaging solutions for your business—and extend them to corporate Web portals—with code and instruction straight from the source. This classic reference—now in...

Wireless Optical Communication Systems
Wireless Optical Communication Systems
The use of optical free-space emissions to provide indoor wireless communications
has been studied extensively since the pioneering work of Gfeller
and Bapst in 1979 [1]. These studies have been invariably interdisciplinary involving
such far flung areas such as optics design‚ indoor propagation studies‚
electronics
...
Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware: The Ultimate Guide to Network Security

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to...

Unconstrained Face Recognition (International Series on Biometrics)
Unconstrained Face Recognition (International Series on Biometrics)
Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a...
WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

History of Nordic Computing
History of Nordic Computing
This book is dedicated to the men and women who seek to preserve the legacy of the computing profession, particularly those from the Nordic ...
Gray Hat Hacking, Second Edition
Gray Hat Hacking, Second Edition
Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...

Network Programming for the Microsoft .NET Framework
Network Programming for the Microsoft .NET Framework

The definitive guide to building more powerful network applications using the .NET Framework. Learn the best ways to exploit the networking APIs in the .NET Framework—and deliver greater flexibility, interoperability, and power to your network applications. Three network programming specialists from Microsoft demonstrate how to use the...

Head First Design Patterns
Head First Design Patterns

You're not alone. At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don't want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns--the lessons learned by those who've faced the same problems. With Design Patterns, you get to take...

The Struts Framework: Practical Guide for Java Programmers
The Struts Framework: Practical Guide for Java Programmers

"I heartily endorse this book. Since an early copy of Sue's manuscript hit my desk, it has not left my side and is now well thumbed and gathering coffee stains from regular use." Simon Chappell - Java Programming Specialist with a Fortune 100 company."

"Sue Spielman launches the aspiring Java J2EE programmer on...

Cocos2d-x Game Development Essentials
Cocos2d-x Game Development Essentials

Create iOS and Android games from scratch using Cocos2d-x

About This Book

  • Create and run Cocos2d-x projects on iOS and Android platforms.
  • Find practical solutions to many real-world game development problems.
  • Learn the essentials of Cocos2d-x by writing code and following...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy