Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agile For Dummies, IBM Limited Edition
Agile For Dummies, IBM Limited Edition
Welcome to Agile For Dummies, IBM Limited Edition. You’ve probably been hearing about agile for a long time, which isn’t surprising. If you’re not using agile methods already though, or if you’ve only been exposed to agile on small projects here and there, you may wonder how to get started with it. Can...
Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

Programming Interviews Exposed: Secrets to Landing Your Next Job
Programming Interviews Exposed: Secrets to Landing Your Next Job
The most important thing we have to tell you is the same as in the first edition: You will get as much out of this book as you put into it. If you read this book cover to cover, you will learn something, but not nearly as much as you would if you take some time trying to work through the problems before you read the answers. ...
Advanced FPGA Design: Architecture, Implementation, and Optimization
Advanced FPGA Design: Architecture, Implementation, and Optimization

In the design-consulting business, I have been exposed to countless FPGA (Field Programmable Gate Array) designs, methodologies, and design techniques. Whether my client is on the Fortune 100 list or is just a start-up company, they will inevitably do some things right and many things wrong. After having been exposed to a wide variety of...

Elixir Cookbook
Elixir Cookbook

Unleash the full power of programming in Elixir with over 60 incredibly effective recipes

About This Book

  • Use Elixir to solve common problems associated with scalability, concurrency, fault tolerance, and high availability
  • From command line to external API interaction, experience the joy...
Principles of Digital Image Processing: Advanced Methods (Undergraduate Topics in Computer Science)
Principles of Digital Image Processing: Advanced Methods (Undergraduate Topics in Computer Science)

This textbook is the third of three volumes which provide a modern, algorithmic introduction to digital image processing, designed to be used both by learners desiring a firm foundation on which to build, and practitioners in search of critical analysis and concrete implementations of the most important techniques. This volume builds upon the...

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Practical .NET for Financial Markets
Practical .NET for Financial Markets
Practical .NET for Financial Markets was born because we were convinced no focused literature
existed for people involved in application/product development in financial markets using .NET.
Although a lot of .NET-related material is available, most often it is not relevant for developers in
the finance domain. The finance domain
...
Firefox Hacks
Firefox Hacks

Firefox Hacks is ideal for power users who want to maximize the effectiveness of Firefox, the next-generation web browser that is quickly gaining in popularity. This highly-focused book offers all the valuable tips and tools you need to enjoy a superior and safer browsing experience. Learn how...

Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
"Today, databases house our 'information crown jewels', but database security is one of the weakest areas of most information security programs. With this excellent book, Ben-Natan empowers you to close this database security gap and raise your database security bar!" Bruce W. Moulton. CISO/VP, Fidelity Investments (1995 - 2001)...
Result Page: 21 20 19 18 17 16 15 14 13 12 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy