Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Acres of Skin: Human Experiments at Holmesburg Prison
Acres of Skin: Human Experiments at Holmesburg Prison
In the first expose of unjust medical experimentation since David Rothman's Willowbrook's Wars, Allen M. Hornblum releases devastating stories from within the walls of Philadelphia's Holmesburg Prison. For more than two decades, from the mid-1950s through the mid-1970s, inmates were used, in exchange for a few dollars, as guinea pigs...
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
Python Developer's Handbook (Developer's Library)
Python Developer's Handbook (Developer's Library)
The Python Developer's Handbook is designed to expose experienced developers to Python and its uses. Beginning with a brief introduction to the language and its syntax, the book moves quickly into more advanced programming topics, including embedding Python, network programming, GUI toolkits, JPython, Web development, Python/C API, and more. Python...
Cyber Risks for Business Professionals: A Management Guide
Cyber Risks for Business Professionals: A Management Guide

The benefits which Internet technologies offer to business professionals also present considerable risks. The management of these risks is the focus of this book.

Realize the benefits of Internet technologies, while ensuring your company is protected from the associated risks!

An effective risk management...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
ASP.NET MVC Framework Unleashed
ASP.NET MVC Framework Unleashed

In this book, world-renowned ASP.NET expert and member of the Microsoft ASP.NET team Stephen Walther shows experienced developers how to use Microsoft’s new ASP.NET MVC Framework to build web applications that are more powerful, flexible, testable, manageable, scalable, and extensible.

ASP.NET Web API 2: Building a REST Service from Start to Finish
ASP.NET Web API 2: Building a REST Service from Start to Finish

The ASP.NET MVC Framework has always been a good platform on which to implement REST-based services, but the introduction of the ASP.NET Web API Framework raised the bar to a whole new level.

Now in release version 2.1, the Web API Framework has evolved into a powerful and refreshingly usable platform. This concise book provides...

Google Maps Mashups with Google Mapplets (Firstpress)
Google Maps Mashups with Google Mapplets (Firstpress)
Have a Google Maps mashup that you’d like to expose to millions of users on maps.google.com? New to the mapping craze, but have an idea for a killer map–based application? Want to learn how to create GeoRSS and KML feeds with your geotagged content, exposing your customer to new ways of exploring and navigating your content?...
Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
Microsoft BizTalk 2010: Line of Business Systems Integration
Microsoft BizTalk 2010: Line of Business Systems Integration

We know that it is rare in IT departments today that solutions do not have to integrate with other systems and even external entities. Systems just have to be connected to support the complex business processes and levels of automation that the business is demanding. Some of these systems are really at the core of the business. They can...

The Mikado Method
The Mikado Method

Summary

The Mikado Method is a book written by the creators of this process. It describes a pragmatic, straightforward, and empirical method to plan and perform non-trivial technical improvements on an existing software system. The method has simple rules, but the applicability is vast. As you read,...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy