Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design
Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design
Here are those little gems of advice that a skilled mentor who peered over your shoulder would tell you. If you lack such a mentor, this book is the next best thing, explaining just what you need to do in a straightforward, easy-to-read, easy-to-understand manner.

--Don Norman, Nielsen Norman group, Prof., Northwestern
...
Mastering Python Scripting for System Administrators: Write scripts and automate them for real-world administration tasks using Python
Mastering Python Scripting for System Administrators: Write scripts and automate them for real-world administration tasks using Python

Leverage the features and libraries of Python to administrate your environment efficiently.

Key Features

  • Learn how to solve problems of system administrators and automate routine activities
  • Learn to handle regular expressions, network administration
  • ...
Stealing the Network: How to Own a Shadow
Stealing the Network: How to Own a Shadow
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress
...
Business Data Communications and Networking: A Research Perspective
Business Data Communications and Networking: A Research Perspective
Research in the area of data communications and networking is well and alive as this collection of contributions show. The book has received enhanced contributions from the authors that published in the inaugural volume of the International Journal of Business Data Communications and Networking (http://www.idea-group.com/ijbdcn). The chapters are...
Scripting Intelligence: Web 3.0 Information, Gathering and Processing
Scripting Intelligence: Web 3.0 Information, Gathering and Processing
This book covers Web 3.0 technologies from a software developer’s point of view. While nontechies can use web services and portals that other people create, developers have the ability to be creators and consumers at the same time—by integrating their work with other people’s efforts.

The Meaning of Web 3.0
...
Scandinavian Cooking
Scandinavian Cooking

Beatrice Ojakangas brings to life the cuisines and customs of Norway, Sweden, Finland, and Denmark, countries that share borders and bounty. Danes lead with smørrebrød (an open-faced sandwich), which may be topped with cheese, green pepper, and sliced fresh strawberries. Finns specialize in earthy, chewy whole grain bread....

Microsoft  SQL Server(TM) 2005: Database Essentials Step by Step
Microsoft SQL Server(TM) 2005: Database Essentials Step by Step

Providing answers to real questions from software developers and business analysts, this succinct guide describes practical techniques for gathering and managing software requirements that help you meet project specifications and customer expectations.

Use this authoritative guide to...

Instant Kali Linux
Instant Kali Linux

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...

Clutches and Brakes: Design and Selection, Second Edition (Mechanical Engineering (Marcell Dekker))
Clutches and Brakes: Design and Selection, Second Edition (Mechanical Engineering (Marcell Dekker))
…an indispensable authoritative text by a leading expert in the field….recommended.
-Applied Mechanics Reviews, about the first edition

Written by a leading expert in the field, this reference conveniently gathering numerous formulas, analytical methods, and graphs for the design and selection of a...

Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Practical JIRA Plugins
Practical JIRA Plugins

This book is about plugins for JIRA, the popular issue tracker from Atlassian. An issue tracker lets people collaborate better when there are things to be done. You can use an issue tracker for everything from tracking bugs in software, to customer support requests, and beyond. Plugins extend what JIRA can do and can be developed...

IT Inventory and Resource Management with OCS Inventory NG 1.02
IT Inventory and Resource Management with OCS Inventory NG 1.02

OCS Inventory NG is a cross-platform, open-source inventory and asset management solution. It brings more than plentiful features to the table to satisfy the business needs of small-to-large organizations with up to tens of thousands of computers. However, to put this inventory solution to optimum use requires a lot of skill.

This...

unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy