Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

JavaFX 1.2 Application Development Cookbook
JavaFX 1.2 Application Development Cookbook

JavaFX Script enables you to easily create rich Internet applications by embedding multimedia components. Although you can create stylish Internet applications by modifying these default components, even advanced users find it challenging to create impressive feature-rich Internet applications with JavaFX. Also, there are limited JavaFX...

The Browser Hacker's Handbook
The Browser Hacker's Handbook

Hackers exploit browser vulnerabilities to attack deep within networks

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security...

Expert Oracle Database Architecture
Expert Oracle Database Architecture

Now in its third edition, this best-selling book continues to bring you some of the best thinking on how to apply Oracle Database to produce scalable applications that perform well and deliver correct results. Tom Kyte and Darl Kuhn share a simple philosophy: "you can treat Oracle as a black box and just stick data into it, or you can...

Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
IBM Cognos Business Intelligence
IBM Cognos Business Intelligence

Discover the practical approach to BI with IBM Cognos Business Intelligence

  • Learn how to better administer your IBM Cognos 10 environment in order to improve productivity and efficiency.
  • Empower your business with the latest Business Intelligence (BI) tools.
  • Discover advanced tools and...
RabbitMQ Cookbook
RabbitMQ Cookbook

Knowing a reliable enterprise messaging system based on the AMQP standard can be an essential for today’s software developers. This cookbook helps you learn all the basics of RabbitMQ through recipes, code, and real-life examples.

Overview

  • Create scalable distributed applications with RabbitMQ
  • ...
Alice 3 Cookbook
Alice 3 Cookbook

Alice is a free and innovative 3D programming environment that makes it easy to create an animation for telling a story, playing an interactive game, or a video to share on the Web. Alice is a teaching tool designed as a revolutionary approach to teaching and learning introductory programming concepts.

Alice 3 Cookbook focuses on...

Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Robust Control Systems with Genetic Algorithms (Control Series)
Robust Control Systems with Genetic Algorithms (Control Series)

In recent years, new paradigms have emerged to replace-or augment-the traditional, mathematically based approaches to optimization. The most powerful of these are genetic algorithms (GA), inspired by natural selection, and genetic programming, an extension of GAs based on the optimization of symbolic codes.

Robust
...

The Encyclopedia of Animated Cartoons
The Encyclopedia of Animated Cartoons
In the beginning (this was the 1960s for me), Saturday mornings existed for the sole purpose of watching cartoons. Before my brother and I were allowed to turn on the TV the only rule was that our beds had to be made, our breakfast eaten (Quisp! cereal) and our teeth brushed. Of course, we were up at the crack of dawn so as to not miss a thing....
Measuring Information Systems Delivery Quality
Measuring Information Systems Delivery Quality
After years of experience with building systems, the information systems (IS)
community is still challenged by systems delivery, that is, planning the implementation
project, determining system features and requirements, sourcing and
deploying the software, and managing its evolution. High-quality systems are
still elusive. Yet
...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy