Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Emotional Engineering vol. 2
Emotional Engineering vol. 2

In an age of increasing complexity, diversification and change, customers expect services that cater to their needs and to their tastes. Emotional Engineering vol 2. describes how their expectations can be satisfied and managed throughout the product life cycle, if producers focus their attention more on emotion. Emotional engineering...

Creating Mobile Apps with jQuery Mobile - Second Edition
Creating Mobile Apps with jQuery Mobile - Second Edition

Create fully responsive and versatile real-world apps for smartphones with jQuery Mobile 1.4.5

About This Book

  • Learn how to integrate advanced features such as Geolocation, HTML 5 Video, and the Web Audio API into your web application
  • Enhance your efficiency by automating repetitive tasks...
Getting to Know Vue.js: Learn to Build Single Page Applications in Vue from Scratch
Getting to Know Vue.js: Learn to Build Single Page Applications in Vue from Scratch

Learn how to render lists of items without repeating your code structure and how to work with conditional rendering items and event handling. Containing all you need to know to get started with Vue.js, this book will take you through using build tools (transpile to ES5), creating custom components, state management, and...

.NET Compact Framework Programming with Visual Basic .NET (Microsoft Net Development Series)
.NET Compact Framework Programming with Visual Basic .NET (Microsoft Net Development Series)

.NET Compact Framework Programming with Visual Basic .NET is the definitive tutorial and reference for the .NET Compact Framework (CF). It shows you how to transfer your skills and your code to the Pocket PC 2003 and other mobile and embedded...

Learning XML, Second Edition
Learning XML, Second Edition
In this new edition of the best selling title, the author explains the important and relevant XML technologies and their capabilities clearly and succinctly with plenty of real-life projects and useful examples. He outlines the elements of markup--demystifying concepts such as attributes, entities, and namespaces--and provides enough depth and...
Fast, Efficient and Predictable Memory Accesses: Optimization Algorithms for Memory Architecture Aware Compilation
Fast, Efficient and Predictable Memory Accesses: Optimization Algorithms for Memory Architecture Aware Compilation
The influence of embedded systems is constantly growing. Increasingly powerful and versatile devices are being developed and put on the market at a fast pace. The number of features is increasing, and so are the constraints on the systems concerning size, performance, energy dissipation and timing predictability. Since most systems today use a...
Spring Web Flow 2 Web Development
Spring Web Flow 2 Web Development

Many web applications need to take the user through a defined series of steps such as e-commerce checkouts or user registrations. Spring Web Flow works well for rich and flexible user interaction, additionally it helps you to describe the flow of websites in complex processes. Spring Web Flow 2 provides the perfect way to build these kinds of...

The Ethics of Computer Games
The Ethics of Computer Games
Despite the emergence of computer games as a dominant cultural industry (and the accompanying emergence of computer games as the subject of scholarly research), we know little or nothing about the ethics of computer games. Considerations of the morality of computer games seldom go beyond intermittent portrayals of them in the mass media as training...
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
SilverStripe 2.4 Module Extension, Themes, and Widgets: Beginner's Guide
SilverStripe 2.4 Module Extension, Themes, and Widgets: Beginner's Guide

SilverStripe CMS is an open source web content management system used by governments, businesses, and non-profit organizations around the world. It is a powerful tool for professional web development teams, and web content authors rave about how easy it is to use.

This book is a beginner-friendly introduction to SilverStripe and...

Pro Business Applications with Silverlight 5 (Professional Apress)
Pro Business Applications with Silverlight 5 (Professional Apress)
Silverlight is a web-based platform from Microsoft that can be used to build Rich Internet Applications (RIAs). Of the many new possibilities it enables, one of its key focuses is as a platform for building business applications. Community support for the technology has been overwhelmingly positive, and Microsoft has gone on to use...
unlimited object storage image
Result Page: 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy