Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Oracle PL/SQL for DBAs
Oracle PL/SQL for DBAs

PL/SQL, Oracle's powerful procedural language, has been the cornerstone of Oracle application development for nearly 15 years. Although primarily a tool for developers, PL/SQL has also become an essential tool for database administration, as DBAs take increasing responsibility for site performance and as the lines between...

Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
CCDA: Cisco Certified Design Associate Study Guide, Second Edition (Exam 640-861)
CCDA: Cisco Certified Design Associate Study Guide, Second Edition (Exam 640-861)

Here’s the book you need to prepare for Cisco’s revised CCDA exam, 640-861. This Study Guide provides:

  • In-depth coverage of every CCDA exam objective
  • Practical information on Cisco design solutions
  • Hundreds of challenging practice questions

Authoritative coverage of all...

Mastering Python Scripting for System Administrators: Write scripts and automate them for real-world administration tasks using Python
Mastering Python Scripting for System Administrators: Write scripts and automate them for real-world administration tasks using Python

Leverage the features and libraries of Python to administrate your environment efficiently.

Key Features

  • Learn how to solve problems of system administrators and automate routine activities
  • Learn to handle regular expressions, network administration
  • ...
Penetration Testing Essentials
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...

Patterns for Effective Use Cases
Patterns for Effective Use Cases

Use cases have become an integral part of modeling software requirements, but many software developers are discovering that writing effective use cases is more difficult than they had anticipated. An understanding of the basic principles of use cases is not enough. Software developers need a source of objective criteria by...

MCSE: Windows Server 2003 Active Directory and Network Infrastructure Design Study Guide (Exam 70-297)
MCSE: Windows Server 2003 Active Directory and Network Infrastructure Design Study Guide (Exam 70-297)

Here’s the book you need to prepare for the Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure exam (70-297). This Study Guide was developed to meet the exacting requirements of today’s certification candidates. In addition to the consistent and accessible instructional approach that earned...

Inter-Organizational Information Systems in the Internet Age
Inter-Organizational Information Systems in the Internet Age

Since the U.S. Department of Defense initiated the development of networked computers in 1969, Internet technologies have rapidly advanced and revolutionized the way we communicate and conduct business. The second wave of the technological revolution came with intranet technology in the mid-1990s. With the intranet,...

How to Do Everything with Microsoft Office InfoPath 2003
How to Do Everything with Microsoft Office InfoPath 2003

Use this amazingly practical and powerful Microsoft Office application like a pro with help from this all-inclusive guide. You’ll learn how to design and customize electronic forms and easily integrate form data into a wide variety of systems and applications. Create simple to complex forms and master the built-in formatting options...

Software Requirements Using the Unified Process
Software Requirements Using the Unified Process

This book presents a systematic, easy-to-apply methodology for creating effective requirements. The authors present practical solutions for the full requirements lifecycle: gathering, analysis, specification, verification, and maintenance.

Working in the context of the Unified Process, they cover process...

Programming Microsoft InfoPath (Programming Series)
Programming Microsoft InfoPath (Programming Series)

Infopath 2003 is a new addition to Microsoft Office that streamlines the process of gathering, sharing, and using information, by enabling teams and organizations to create, share and work with rich, dynamic forms. The information gathered is easily reusable throughout organizations and across multiple processes because the native file...

Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy