Home | Amazing | Today | Tags | Publishers | Years | Search 
Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
Professional Plone Development
Professional Plone Development
This book teaches Plone development best practices, focusing on Plone 3.0. It covers setting up a development environment, customizing Plone's look and feel, creating new content types and forms, connecting to external databases, managing users and groups intelligently, configuring a production-ready server, LDAP authentication, and caching. Aimed...
Hand Surgery. 2 Volume Set
Hand Surgery. 2 Volume Set

The bones of the hand and wrist, which are linked by synovial joints, provide a mobile yet stable framework that is crucial for strenuous work and fine manipulative activity. A built-in mechanism of...

The Art of Mixing: A Visual Guide to Recording, Engineering, and Production, Second Edition
The Art of Mixing: A Visual Guide to Recording, Engineering, and Production, Second Edition
Get ready for an in-depth exploration into the aesthetics of what makes a great mix! David Gibson's unique approach to mixing gives you a visual representation of the dynamics of the sounds involved in creating a musical mix. Through this three-dimensional, colorful explanation, you are introduced to a framework that will help you understand...
The Real Business of Web Design
The Real Business of Web Design
The Real Business of Web Design reviews how the Internet became an integral part of our culture and provides a broad framework of specific tools for improving Web initiatives in any business. The author’s analysis of information as currency, the pitfalls of acronyms, the perils of "tech-talk," and the value of abundance helps make...
Medical Response to Terrorism: Preparedness and Clinical Practice
Medical Response to Terrorism: Preparedness and Clinical Practice
Even two decades ago, few would have imagined that terrorism would be planned and carried out on such an enormous scale as it is today. Terrorist attacks rely on horror and surprise, invoking different times, places, victims, and methods. Their purpose is to cause widespread confusion, fear, injury, and death. They disrupt security,...
Professional Windows Vista Gadgets Programming (Programmer to Programmer)
Professional Windows Vista Gadgets Programming (Programmer to Programmer)
Professional Windows Vista Gadgets Programming

As an easy-to-use application that provides information at a glance, a gadget basically takes the concept of portal dashboards and moves them to the more accessible Windows desktop where users can quickly and easily obtain weather information, RSS news feeds, and much more. In...

LINQ Pocket Reference
LINQ Pocket Reference
Ready to take advantage of LINQ with C# 3.0? This guide has the detail you need to grasp Microsoft's new querying technology, and concise explanations to help you learn it quickly. And once you begin to apply LINQ, the book serves as an on-the-job reference when you need immediate reminders. All the examples in the LINQ Pocket Reference are...
C# 3.0 Pocket Reference: Instant Help for C# 3.0 Programmers
C# 3.0 Pocket Reference: Instant Help for C# 3.0 Programmers

This book is for busy programmers who want a succinct and yet readable guide to C# 3.0 and LINQ. C# 3.0 Pocket Reference tells you exactly what you need to know, without long introductions or bloated samples. Despite its conciseness, this book doesn't skimp on depth or detail, and embraces the...

Problem Solving: Methods, Programming and Future Concepts
Problem Solving: Methods, Programming and Future Concepts
Problem solving is the very area of artificial intelligence (AI) which, probably, will never result in a complete set of formalized theories, in a kind of pragmatic philosophy, or in a "universal" applied discipline. Studying the questions concerning this area encompasses different concepts, models and theories.

In this
...
The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

The First 90 Days: Critical Success Strategies for New Leaders at All Levels
The First 90 Days: Critical Success Strategies for New Leaders at All Levels
Whether challenged with taking on a startup, turning a business around, or inheriting a high-performing unit, a new leader's success or failure is determined within the first 90 days on the job.

In this hands-on guide, Michael Watkins, a noted expert on leadership transitions, offers proven strategies for moving successfully into a...

Result Page: 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy