Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

PHP Solutions: Dynamic Web Design Made Easy
PHP Solutions: Dynamic Web Design Made Easy
In this book you'll learn how to:
  • Create dynamic websites with design and usability in mind, as well as functionality
  • Understand how PHP scripts work, giving you confidence to adapt them to your own needs
  • Bring online forms to life, check required fields, and ensure user input is safe to process
  • ...
SQL: The Complete Reference
SQL: The Complete Reference
Gain the working knowledge of SQL and relational databases essential for
today's information systems professionals. Relational databases built on the
SQL database language are the foundation for modern enterprise data
processing and are also a force behind many of today's important technology
trends.

SQL: The Complete
...
ROI of Software Process Improvement: Metrics for Project Managers and Software Engineers
ROI of Software Process Improvement: Metrics for Project Managers and Software Engineers

This book masterfully illuminates extremely simple, but overwhelmingly powerful metrics, models, and methods for designing professional business cases while the author demystifies esoteric concepts in ROI.


An indispensable addition to your...

OSPF Network Design Solutions
OSPF Network Design Solutions

Network routing protocols have emerged as key enabling technologies in a computing world now dominated by connectivity. From a very high-level perspective, these routing protocols can be split into interior gateway protocols (IGPs) and exterior gateway protocols (EGPs). In general, the routing techniques used by IGPs are based on either...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Encyclopedia of Twentieth-Century Photography (3 Volumes)
Encyclopedia of Twentieth-Century Photography (3 Volumes)
Photography is an international cultural form, practice, and profession. Encompassing art, advertising, journalism, fashion, commercial, political, and everyday photography, the field of photography also includes chemical processes, mechanical inventions, equipment, industries, movements, techniques, terms and concepts. In addition, photography has...
Data Visualization with D3.js Cookbook (Community Experience Distilled)
Data Visualization with D3.js Cookbook (Community Experience Distilled)

Over 70 recipes to create dynamic data-driven visualization with D3.js

Overview

  • Create stunning data visualization with the power of D3
  • Bootstrap D3 quickly with the help of ready-to-go code samples
  • Solve real-world visualization problems with the help of practical...
Conquering Complexity in Your Business: How Wal-Mart, Toyota, and Other Top Companies Are Breaking Through the Ceiling on Profits and Growth
Conquering Complexity in Your Business: How Wal-Mart, Toyota, and Other Top Companies Are Breaking Through the Ceiling on Profits and Growth
Over the past two decades, my colleagues and I have helped many businesses
create shareholder value primarily through process improvement.
But we often found that clients who restricted their efforts to improvement
approaches such as Lean and/or Six Sigma would hit a ceiling in
profit generation: though progress was significant,
...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

The Disciplinary Frame: Photographic Truths and the Capture of Meaning
The Disciplinary Frame: Photographic Truths and the Capture of Meaning
Photography can seem to capture reality and the eye like no other medium, commanding belief and wielding the power of proof. In some cases, a photograph itself is attributed the force of the real. How can a piece of chemically discolored paper have such potency? How does the meaning of a photograph become fixed? In The Disciplinary Frame,...
The Encyclopedia of World Religions (Facts on File Library of Religion and Mythology)
The Encyclopedia of World Religions (Facts on File Library of Religion and Mythology)
Gratifi ed by the response to the initial publication of The Encyclopedia of World Religions, the editors have prepared a revised and much enhanced edition of this work. The new edition contains 100 new articles on as many fresh topics, from ACTS OF THE APOSTLES to VIETNAMESE RELIGIONS. Numerous suggestions for further reading have been added...
Result Page: 46 45 44 43 42 41 40 39 38 37 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy