Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PowerShell and Python Together: Targeting Digital Investigations
PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.

You will learn how to join PowerShell's robust set of commands and access to the
...
The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series)
The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series)

An Under-the-Hood Guide to the Power of Xen Hypervisor Internals


The Definitive Guide to the Xen Hypervisor is a comprehensive...

HTML 4 Bible (with CD-ROM)
HTML 4 Bible (with CD-ROM)
If HTML 4 can do it, you can do it too...
If the new edition of this comprehensive one-stop guide, author Bryan Pfaffenberger and Bill Karow offer step-by-step guidance on building state-of-the-art Web pages with the newest HTML release, 4.01. From an HTML "Quick Start" to expert advice on Cascading Style Sheets,
...
SAP SCM: Applications and Modeling for Supply Chain Management (with BW Primer)
SAP SCM: Applications and Modeling for Supply Chain Management (with BW Primer)

SAP SCM: Applications and Modeling for Supply Chain Management empowers you to capitalize on the sophistication of SAP APO. This book provides clear advice on the inevitable, critical decisions that can lead to project success or failure and shows you, wherever you are on the supply chain management staff—buyer, planner, ground...

C# Multithreaded and Parallel Programming
C# Multithreaded and Parallel Programming

Develop powerful C# applications to take advantage of today's multicore hardware

About This Book

  • Make use of the latest Visual Studio debugging tools, to manage and debug multiple threads running simultaneously
  • Learn how to use the Thread, Task, and Parallel libraries in your C#...
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Expert Oracle, Signature Edition Programming Techniques and Solutions for Oracle 7.3 through 8.1.7
Expert Oracle, Signature Edition Programming Techniques and Solutions for Oracle 7.3 through 8.1.7

This special signature edition includes a CD that contains a searchable PDF version of the book and a sample chapter from the forthcoming 10g edition which will be released in fall 2005.

This remains the defining book on the older 8i Oracle database if you are a developer or DBA who works with Oracle-driven database...

Combinatorial Search: From Algorithms to Systems
Combinatorial Search: From Algorithms to Systems

Although they are believed to be unsolvable in general, tractability results suggest that some practical NP-hard problems can be efficiently solved. Combinatorial search algorithms are designed to efficiently explore the usually large solution space of these instances by reducing the search space to feasible regions and using heuristics to...

OpenGL Development Cookbook
OpenGL Development Cookbook

OpenGL brings an added dimension to your graphics by utilizing the remarkable power of modern GPUs. This straight-talking cookbook is perfect for intermediate C++ programmers who want to exploit the full potential of OpenGL

Overview

  • Explores current graphics programming techniques including GPU-based...
Computer Applications in Pharmaceutical Research and Development (Wiley Series in Drug Discovery and Development)
Computer Applications in Pharmaceutical Research and Development (Wiley Series in Drug Discovery and Development)
A unique, holistic approach covering all functions and phases of pharmaceutical research and development

While there are a number of texts dedicated to individual aspects of pharmaceutical research and development, this unique contributed work takes a holistic and integrative approach to the use of computers in...

Objective-C Recipes: A Problem-Solution Approach
Objective-C Recipes: A Problem-Solution Approach

Objective-C Recipes provides a problem solution approach for dealing with key aspects of Objective-C programming, ensuring you have the indispensable reference you need to successfully execute common programming tasks. You will see how to use the unique features of the Objective-C programming language, the helpful features of the...

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy