Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programmer's Ultimate Security DeskRef
Programmer's Ultimate Security DeskRef
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software...
Agile Project Management with Azure DevOps: Concepts, Templates, and Metrics
Agile Project Management with Azure DevOps: Concepts, Templates, and Metrics

Roll up your sleeves and jump into Agile project management to use and customize Microsoft Azure DevOps. Organizations adopt Agile practices because they are a key enabler to run better projects, get more successful end results, and achieve an overall higher quality output. To benefit the most from Agile, you need an Application Life...

Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Every organization, bureau, agency, and corporation has fundamental analytical needs that traditionally require a significant amount of data integration and resources. Whether investigating money laundering, insider trading, insurance fraud, or terrorist behavior, the analytical processes and systems architectures are very similar. In fact, the...
Designing with the Mind in Mind, Second Edition: Simple Guide to Understanding User Interface Design Guidelines
Designing with the Mind in Mind, Second Edition: Simple Guide to Understanding User Interface Design Guidelines

In this completely updated and revised edition of Designing with the Mind in Mind, Jeff Johnson provides you with just enough background in perceptual and cognitive psychology that user interface (UI) design guidelines make intuitive sense rather than being just a list or rules to follow.

Early UI practitioners were trained...

Learning VBScript (Nutshell Handbooks)
Learning VBScript (Nutshell Handbooks)

With the advent of client-side scripting, it is possible to create programs that run on a user's browser in response to particular user actions, like passing the mouse over a hyperlink or clicking a standard HTML command button. By taking advantage of client-side scripts, web pages can be made more interactive, and programs that...

Mental Health and Well-being Interventions in Sport: Research, Theory and Practice (Routledge Psychological Interventions)
Mental Health and Well-being Interventions in Sport: Research, Theory and Practice (Routledge Psychological Interventions)

Mental health within elite sport has traditionally been ignored, but recent research has shown that competitive sport can at times seriously undermine mental health and that athletes are exposed to specific stressors that hinder their mental health optimisation.

Mental Health and Well-being Interventions in Sport...

Hacking Exposed: Network Security Secrets & Solutions, Third Edition
Hacking Exposed: Network Security Secrets & Solutions, Third Edition

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."...

Building Scalable Web Sites : Building, Scaling, and Optimizing the Next Generation of Web Applications
Building Scalable Web Sites : Building, Scaling, and Optimizing the Next Generation of Web Applications

Slow websites infuriate users. Lots of people can visit your
web site or use your web application - but you have to be prepared for
those visitors, or they won't come back. Your sites need to be built to
withstand the problems success creates.

Building Scalable Web
...
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Secure Your Network for Free
Secure Your Network for Free
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.

Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for
...
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

Computer Organization, Design, and Architecture, Fourth Edition
Computer Organization, Design, and Architecture, Fourth Edition

This book covers the organization, design, and architecture of computers. Architecture is the ‘‘art or science of building; a method or style of building,’’ according to Webster’s. A computer architect develops the functional and performance specifications for the various blocks of a computer system and...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy