Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
Becoming an Exceptional Executive Coach: Use Your Knowledge, Experience, and Intuition to Help Leaders Excel
Becoming an Exceptional Executive Coach: Use Your Knowledge, Experience, and Intuition to Help Leaders Excel

Coaching is more than simply learning a process and set of skills. Exceptional coaches draw on their professional experience, knowledge of organizationally relevant topics, strong helping skills, coaching-specific competencies, and most important, their ability to use their own intuition in the service of the client. "Becoming an...

Routledge Handbook of Surveillance Studies (Routledge International Handbooks)
Routledge Handbook of Surveillance Studies (Routledge International Handbooks)

Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the...

Mastering Maya Complete 2
Mastering Maya Complete 2
This book will get you acquainted with Maya Complete Version 2. When we started work on Maya in 1995, after the merger of Alias and Wavefront, we wanted to deliver a software system that would change the way computer animation was created by challenging established ways of workingeven those we pioneered ourselves. In Version 1, we set our goals...
High Availability and Disaster Recovery: Concepts, Design, Implementation
High Availability and Disaster Recovery: Concepts, Design, Implementation

Companies and other organizations depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based processes. Business continuity is the ability to do business under any circumstances and is an essential requirement modern companies are facing. High availability and disaster...

Beginning Haskell: A Project-Based Approach
Beginning Haskell: A Project-Based Approach

Beginning Haskell provides a broad-based introduction to the Haskell language, its libraries and environment, and to the functional programming paradigm that is fast growing in importance in the software industry. The book takes a project-based approach to learning the language that is unified around the building of a web-based...

Database Design for Smarties: Using UML for Data Modeling
Database Design for Smarties: Using UML for Data Modeling
If you want to see how your next database project can profit from object-oriented design, check out Database Design for Smarties, a lively and intelligent guide to using objects in databases.

The book begins with a tour of some underlying factors in modeling databases. Here, the author distinguishes between the external,...

Introduction to Information Retrieval
Introduction to Information Retrieval
Class-tested and coherent, this groundbreaking new textbook teaches web-era information retrieval, including web search and the related areas of text classification and text clustering from basic concepts. Written from a computer science perspective by three leading experts in the field, it gives an up-to-date treatment of all aspects of the design...
Honeypots: Tracking Hackers
Honeypots: Tracking Hackers

"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time."
--Stephen Northcutt, The SANS Institute

"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture...

How to Cheat in 3ds Max 2009: Get Spectacular Results Fast
How to Cheat in 3ds Max 2009: Get Spectacular Results Fast
Need to get results with 3ds max fast? Why take months to learn every button in 3ds max when you can create great visuals with just a few key tools? Learn to create quick yet stunning logo treatments, special effects, and animated characters with the fastest techniques possible. Need convincing grass, trees, water, shadows? You can use the...
Penetration Testing Bootcamp
Penetration Testing Bootcamp

Key Features

  • Get practical demonstrations with in-depth explanations of complex security-related problems
  • Familiarize yourself with the most common web vulnerabilities
  • Get step-by-step guidance on managing testing results and reporting

Book Description

...

Beginning InfoPath 2003 (Programmer to Programmer)
Beginning InfoPath 2003 (Programmer to Programmer)
Beginning InfoPath 2003

Microsoft InfoPath 2003 allows users to create forms that can be used immediately for data gathering, analysis, and reporting. This book provides everything you need to maximize the potential of this unique tool.

Whether you're looking to create streamlined forms, understand the code behind InfoPath forms,...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy