Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Vietnam War: The Definitive Illustrated History
The Vietnam War: The Definitive Illustrated History

Created in association with the Smithsonian Institution, this authoritative guide chronicles America's fight against Communism in southeast Asia during the 1960s and 1970s, and comprehensively explores the people, politics, events, and lasting effects of the Vietnam War.

Honoring those who served in the war at home or abroad,...

Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis

Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves...

Computer Sciences: Macmillan Science Library
Computer Sciences: Macmillan Science Library
The science of computing has come a long way since the late 1930s, when John Vincent Atanasoff and Clifford Berry began work on the first electronic digital computer. One marvels to see how the science has advanced from the days of Charles Babbage, who developed the Difference Engine in the 1820s, and, later proposed the...
Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
Developing Analytic Talent: Becoming a Data Scientist
Developing Analytic Talent: Becoming a Data Scientist

Learn what it takes to succeed in the the most in-demand tech job

Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows you exactly what employers want and the skill set that separates the quality data scientist from other talented IT...

Understanding Diabetes: A Biochemical Perspective
Understanding Diabetes: A Biochemical Perspective

A clear explanation of the cause, diagnosis, and treatment of diabetes

Written for a broad range of readers, including students, researchers, policymakers, health care providers, and diabetes patients and caregivers, this book explains the underlying biochemistry and physiology of diabetes mellitus. Each chapter contains a...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

The Savage: A Novel
The Savage: A Novel

In the raucous and action-packed follow-up to Donnybrook, mayhem is still the order of the day―only more so

The dollar has failed; the grid is wiped out. Walmarts are looted and homes are abandoned as common folk flee and bloodthirsty militias fight for power. In a twenty-first century America gone haywire,...

Formula One Racing for Dummies
Formula One Racing for Dummies
Formula One racing is the pinnacle of motor racing around the world. These days, the sport is a truly global circus. At almost every race on the calendar, more than 120,000 spectators cram into the grandstands and spectator banking, all vying for a view of the millionaire superstar drivers. At the same time, in 150 countries worldwide, more than...
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

Open Sources: Voices from the Open Source Revolution
Open Sources: Voices from the Open Source Revolution
Open Sources: Voices from the Open Source Revolution is a fascinating look at the raging debate that is its namesake. Filled with writings from the central players--from Linux creator Linus Torvalds to Perl creator Larry Wall--the book convinces the reader of the overwhelming merits of freeing up the many iterations of software's source...
Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy