Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Grokking Simplicity: Taming complex software with functional thinking
Grokking Simplicity: Taming complex software with functional thinking
Grokking Simplicity is a friendly, practical guide that will change the way you approach software design and development.

Summary
Distributed across servers, difficult to test, and resistant to modification—modern software is complex. Grokking Simplicity is a friendly, practical guide that
...
Drug Use for Grown-Ups: Chasing Liberty in the Land of Fear
Drug Use for Grown-Ups: Chasing Liberty in the Land of Fear
“Hart’s argument that we need to drastically revise our current view of illegal drugs is both powerful and timely . . . when it comes to the legacy of this country’s war on drugs, we should all share his outrage.” —The New York Times Book Review

From one of the world's
...
Arduino Wearables
Arduino Wearables
At a young age, I lived very close to my grandmothers and I used to visit them often. Both of my grandmothers were very skilled in textile handcrafts and, along with my mother, were firm believers that sewing is one of those basic skills that everyone should know. One grandmother was amazing at crocheting and needlepoint, and the...
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart (2nd Edition)
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart (2nd Edition)

Many years ago, when I had to learn C overnight to make a living as a programmer (this was before C++), I would have given half my salary to find a mentor, a person would say, “Here are the potholes in the road...errors that you are sure to make in learning C. And here’s how to steer around them.” Instead, I had to...

Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

Pragmatic Unit Testing in C# with NUnit (Pragmatic Programmers)
Pragmatic Unit Testing in C# with NUnit (Pragmatic Programmers)
Learn how to improve your C# coding skills using unit testing. Despite it's name, unit testing is really a coding technique, not a testing technique. Unit testing is done by programmers, for programmers. It's primarily for our benefit: we get improved confidence in our code, better ability to make deadlines, less time spent in the debugger, and...
Extended STL, Volume 1: Collections and Iterators
Extended STL, Volume 1: Collections and Iterators
My Uncle John is what my parents’ generation would call “a man’s man.” He’s tough, rugged, a bit scary, with more than a little of the cowboy in him, and he would admit to fear about as readily as I could render modest defeat. So when he described to me that the challenge in doing your second parachute jump is...
Getting Started with Your Mac and Mac OS X Tiger : Peachpit Learning Series
Getting Started with Your Mac and Mac OS X Tiger : Peachpit Learning Series

You bought your Mac OS X Tiger computer because you thought it would be easy to use-and it is! But if you've never used a computer before, never stared at a graphical user interface or clicked an icon to launch a program or open a file, getting going with your new machine can still be a daunting proposition. With this guide from...

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Inside Internet Security: What Hackers Don't Want You To Know
Inside Internet Security: What Hackers Don't Want You To Know
This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business....
Let Them See You: The Guide for Leveraging Your Diversity at Work
Let Them See You: The Guide for Leveraging Your Diversity at Work
The guide to getting hired, being promoted, and thriving professionally for the 40 million people of color in the workplace—from the CEO and cofounder of Jopwell, the leading career advancement platform for Black, Latinx, and Native American students and professionals.
 
Let Them See You is a
...
unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy