Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
UML Bible
UML Bible
If UML can do it, you can do it too...

Today’s economy demands top quality software development in record time and with maximum efficiency. UML arms you to meet that challenge, and the UML Bible supplies the most comprehensive UML education you can get. One volume covers everything from understanding and using UML and diagramming notation...

Magnetohydrodynamics of Laboratory and Astrophysical Plasmas
Magnetohydrodynamics of Laboratory and Astrophysical Plasmas
With ninety per cent of visible matter in the universe existing in the plasma state, an understanding of magnetohydrodynamics is essential for anyone looking to understand solar and astrophysical processes, from stars to accretion discs and galaxies; as well as laboratory applications focused on harnessing controlled fusion energy. This...
Truffle Quick Start Guide: Learn the fundamentals of Ethereum development
Truffle Quick Start Guide: Learn the fundamentals of Ethereum development

Develop, test, and deploy decentralized applications for Ethereum platform

Key Features

  • Build your first Ethereum Dapp with Truffle: the most popular Ethereum development framework
  • Build, compile, and deploy smart contracts in your development environment
  • ...
The 3CX IP PBX Tutorial
The 3CX IP PBX Tutorial

Traditional PBX systems have often been expensive and proprietary. With 3CX, you can now create an easy-to-use, complete, and cost-effective phone system on Microsoft Windows. This practical guide offers the insight that a reader needs to exploit the potential that 3CX has to offer.

This practical hands-on book covers everything...

Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation (Systems on Silicon)
Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation (Systems on Silicon)
In the two decades since field-programmable gate arrays (FPGAs) were introduced, they have radically changed the way digital logic is designed and  deployed. By marrying the high performance of application-specific integrated circuits (ASICs) and the flexibility of microprocessors, FPGAs have made possible entirely new types of applications....
Deformable Surface 3D Reconstruction from Monocular Images (Synthesis Lectures on Computer Vision)
Deformable Surface 3D Reconstruction from Monocular Images (Synthesis Lectures on Computer Vision)
Deformable surface 3D reconstruction from monocular images is an active area of research in the Computer Vision community. This encompasses recovering both the shape of thin objects that can be treated as surfaces without perceptible thickness and the visible envelope of fully 3D objects. Whereas this may seem easy for a human...
Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

My Dear Reader,

This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting
...

Java Programming Fundamentals: Problem Solving Through Object Oriented Analysis and Design
Java Programming Fundamentals: Problem Solving Through Object Oriented Analysis and Design
Programming is an art. Although traditional art imitates life, programming simulates life. Every abstract concept in programming, and to a great extent in the fi eld of computer science, has its roots in our daily life. For example, humans and possibly all other living forms were multiprocessing long before the term entered into...
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python

Leverage the simplicity of Python and available libraries to build web security testing tools for your application

Key Features

  • Understand the web application penetration testing methodology and toolkit using Python
  • Write a web crawler/spider with the Scrapy library
  • ...
Penetration Testing with the Bash shell
Penetration Testing with the Bash shell

Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools

About This Book

  • Utilize the command line to create, run, and execute tests
  • Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy