Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
The St. Martin's Guide to Writing
The St. Martin's Guide to Writing


Whether you have years of experience as a teacher or are new to the classroom, you and your students can count on The St. Martin’s Guide to Writing to provide the support you need in first-year composition, with a rhetoric, an array of engaging readings, a research manual, and a handbook, all in a single book...

Founders at Work: Stories of Startups' Early Days (Recipes: a Problem-Solution Ap)
Founders at Work: Stories of Startups' Early Days (Recipes: a Problem-Solution Ap)
Sprinters apparently reach their highest speed right out of the blocks, and spend the rest of the race slowing down. The winners slow down the least. It’s that way with most startups too. The earliest phase is usually the most productive. That’s when they have the really big ideas. Imagine what Apple was like when 100 percent of its...
Depth Map and 3D Imaging Applications: Algorithms and Technologies
Depth Map and 3D Imaging Applications: Algorithms and Technologies
This book has three editors, and all of us are involved in image processing and computer vision research. We have contributed to the 3D imaging research, especially in the field of passive optical 3D shape recovery methods. Over the last decade, significant progress had been made in 3D imaging research. As a result, 3D imaging...
RabbitMQ Cookbook
RabbitMQ Cookbook

Knowing a reliable enterprise messaging system based on the AMQP standard can be an essential for today’s software developers. This cookbook helps you learn all the basics of RabbitMQ through recipes, code, and real-life examples.

Overview

  • Create scalable distributed applications with RabbitMQ
  • ...
Real-Time Visual Effects for Game Programming (Gaming Media and Social Effects)
Real-Time Visual Effects for Game Programming (Gaming Media and Social Effects)

This book introduces the latest visual effects (VFX) techniques that can be applied to game programming. The usefulness of the physicality-based VFX techniques, such as water, fire, smoke, and wind, has been proven through active involvement and utilization in movies and images. However, they have yet to be extensively applied in the game...

This Means This, This Means That: A User's Guide to Semiotics
This Means This, This Means That: A User's Guide to Semiotics

Semiotics is the theory of signs, and reading signs is a part of everyday life: from road signs that point to a destination, to smoke that warns of fire, to the symbols buried within art and literature. Semiotic theory can, however, seem mysterious and impenetrable. This introductory book decodes that mystery using visual examples instead of...

Fire Up Your Communication Skills: Get People to Listen, Understand, and Give You What You Want!
Fire Up Your Communication Skills: Get People to Listen, Understand, and Give You What You Want!

This is a great bathroom book. You go in constipated and come out motivated. Perfect for today's busy reader. There's even a condensed version within the book for "Emergency Situations". You don't have to start this book from the beginning. Just pick a chapter of interest and go for it.

I wrote this book to...

Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone...

Backyard Ballistics: Build Potato Cannons, Paper Match Rockets, Cincinnati Fire Kites, Tennis Ball Mortars, and More Dynamite Devices
Backyard Ballistics: Build Potato Cannons, Paper Match Rockets, Cincinnati Fire Kites, Tennis Ball Mortars, and More Dynamite Devices
Ordinary folks can construct 13 awesome ballistic devices in their garage or basement workshops using inexpensive household or hardware store materials and this step-by-step guide. Clear instructions, diagrams, and photographs show how to build projects ranging from the simple-a match-powered rocket-to the more complex-a scale-model, table-top...
Next-Generation Internet: Architectures and Protocols
Next-Generation Internet: Architectures and Protocols

The field of computer networking has evolved significantly over the past four decades since the development of ARPANET, the first large-scale computer network. The Internet has become a part and parcel of everyday life virtually worldwide, and its influence on various fields is well recognized. The TCP/IP protocol suite and packet...

Event-Driven Programming
Event-Driven Programming
The previous unit, Unit 6, has shown you how to create graphical user interfaces that contain a wide range of components and have quite sophisticated layouts. You are also in a position now to make use of Java reference material to investigate and use other components and layouts. However, when the user clicks on a button or enters text, nothing...
Result Page: 16 15 14 13 12 11 10 9 8 7 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy