Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Solving Everyday Problems with the Scientific Method: Thinking Like a Scientist
Solving Everyday Problems with the Scientific Method: Thinking Like a Scientist

This book describes how one can use The Scientific Method to solve everyday problems including medical ailments, health issues, money management, traveling, shopping, cooking, household chores, etc. It illustrates how to exploit the information collected from our five senses, how to solve problems when no information is available for the...

Hacking Exposed: Network Security Secrets & Solutions, Third Edition
Hacking Exposed: Network Security Secrets & Solutions, Third Edition

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."...

Computational Intelligence in Telecommunications Networks
Computational Intelligence in Telecommunications Networks

Telecommunications has evolved and grown at an explosive rate in recent years and will undoubtedly continue to do so. As its functions, applications, and technology grow, it becomes increasingly complex and difficult, if not impossible, to meet the demands of a global network using conventional computing technologies. Computational...

Web Application Vulnerabilities: Detect, Exploit, Prevent
Web Application Vulnerabilities: Detect, Exploit, Prevent
This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,...
Autodesk InfraWorks 360 and Autodesk InfraWorks 360 LT Essentials
Autodesk InfraWorks 360 and Autodesk InfraWorks 360 LT Essentials

Get up to speed and get to work quickly with the official InfraWorks handbook

Autodesk InfraWorks and InfraWorks 360 Essentials, 2nd Edition is your comprehensive, hands-on guide to this popular civil engineering software. This unique guide features concise, straightforward explanations and real world exercises...

Writing Secure Code
Writing Secure Code

Improving security was a major focus while we were developing Windows 2000. At one point, we decided to run an unusual experiment to test the product’s mettle before we released it. We set up a Windows 2000 Web server called “Windows2000test.com,” put it out there, and waited to see what happened. We made no...

Processor Microarchitecture: An Implementation Perspective (Synthesis Lectures on Computer Architecture)
Processor Microarchitecture: An Implementation Perspective (Synthesis Lectures on Computer Architecture)

Computers are at the heart of most activities nowadays. A processor is the central component of a computer, but nowadays, we can find processors embedded in many other components, such as game consoles, consumer electronic devices and cars, just to mention a few.

This lecture presents a thorough study of the microarchitecture...

Pro Service-Oriented Smart Clients with .NET 2.0
Pro Service-Oriented Smart Clients with .NET 2.0
This book shows you how to build smart client applications and how to exploit them using
a service-oriented architecture. So, the best way to introduce the book is to define just what
a smart client is.

A smart client is not a technology. Rather, a smart client is a concept for a client application with
specific features.
...
Business in the Cloud: What Every Business Needs to Know About Cloud Computing
Business in the Cloud: What Every Business Needs to Know About Cloud Computing

A close look at cloud computing's transformational role in business

Covering cloud computing from what the business leader needs to know, this book describes how IT can nimbly ramp up revenue initiatives, positively impact business operations and costs, and how this allows business leaders to shed worry about technology so they...

Understanding WMI Scripting (HP Technologies)
Understanding WMI Scripting (HP Technologies)

Understanding WMI Scripting is the first book of two dedicated to Windows Management Instrumentation (WMI). This first book explains to Windows Administrators the various WMI scripting techniques available to ease their day-to-day management tasks. Under Windows Server 2003, Microsoft made solid enhancements in WMI. This...

Developer's Guide to Web Application Security
Developer's Guide to Web Application Security
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.

This book defines Web application security, why it should be
...
The Definitive Guide to Lift: A Scala-based Web Framework (Expert's Voice in Open Source)
The Definitive Guide to Lift: A Scala-based Web Framework (Expert's Voice in Open Source)
Welcome to The Definitive Guide to Lift: A Scala-Based Web Framework! We hope that you find reading our work as informative, fun, and exciting as writing it has been for us. This book started out as some informal discussions between the Lift committers about a need for a good guide beyond the documentation contained on the Lift wiki and API...
unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy