Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
What Every Engineer Should Know About Cyber Security and Digital Forensics
What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be protected by security guards, cipher locks, and an ID badge worn by all employees. As the computing paradigm is continually changing with shared resources and mobility, firewalls and antivirus software are also not enough to protect critical assets. This...
Learn Swift by Building Applications: Explore Swift programming through iOS app development
Learn Swift by Building Applications: Explore Swift programming through iOS app development

Start building your very own mobile apps with this comprehensive introduction to Swift and object-oriented programming

Key Features

  • A complete beginner's guide to Swift programming language
  • Understand core Swift programming concepts and techniques for creating popular...
From COBOL to OOP (The Morgan Kaufmann Series in Software Engineering and Programming)
From COBOL to OOP (The Morgan Kaufmann Series in Software Engineering and Programming)

Driven by the year-2000 problem, the hordes of COBOL developers experienced a renaissance, but the times when COBOL was state-of-the-art are long gone. Object-orientation, application servers, web front-ends, and relational database systems dominate the scene for new projects today. The fact remains however, that millions of lines of source code...

The Incredible Payback: Innovative Sourcing Solutions That Deliver Extraordinary Results
The Incredible Payback: Innovative Sourcing Solutions That Deliver Extraordinary Results
The thrill is gone.

You are in the first seat of the intergalactic thrill ride of your
life—you got on expecting a few twists and turns; the attendant
locked you in the seat; and now your neck hurts, your hands grip
the rail, pieces of clothing and popcorn boxes are flying by, and
you’ve had enough, you
...
Hacking MythTV (ExtremeTech)
Hacking MythTV (ExtremeTech)
Want control? Build your own MythTV PC.

You don't do stuff like this to cut corners. You do it because you want what you wantand because it's fun. And a personalized MythTV is so much more than a PVR. You can combine HDTV, DVD, all kinds of music, radio, photos, even a plug-in videophone module. All you need is a little Linux know-how,...

Hoax of the Twentieth Century
Hoax of the Twentieth Century

Professor A. R. Butz was the first (and so far the only) writer to treat the entire Holocaust complex from the Revisionist perspective, in a precise scientific manner. This book exhibits the overwhelming force of historical and logical arguments which Revisionism had accumulated by the middle of the 70s. This new edition comes with several...

A Practical Guide to Video and Audio Compression
A Practical Guide to Video and Audio Compression
The last few years have been an extraordinary time for the digital video industry. Not long before the turn of the millennium, digital video editing systems were expensive capital items of equipment that only major broadcasters and production companies could afford. To think that now the same capability is available in a laptop that you can buy off...
Fuzzing: Brute Force Vulnerability Discovery
Fuzzing: Brute Force Vulnerability Discovery
The concept of fuzzing has been around for almost two decades but has only recently captured widespread attention. In 2006, we saw a plague of new vulnerabilities emerge that affected popular client-side applications including Microsoft Internet Explorer, Microsoft Word and Microsoft Excel; a large portion of these vulnerabilities were discovered...
Plan to Turn Your Company Around in 90 Days: How to Restore Positive Cash Flow and Profitability
Plan to Turn Your Company Around in 90 Days: How to Restore Positive Cash Flow and Profitability

More than half of all businesses in the U.S. don’t make it to their fifth birthday, and nearly 70 percent are gone by year ten. How do businesses get into trouble? A hundred different ways. Poor cash flow, undercapitalization, lax financial controls, poor worker productivity, boneheaded mistakes, inefficient processes, failure to adapt,...

Implementing OpenShift
Implementing OpenShift

The cloud is a liberating environment when you learn to master OpenShift. Follow this practical tutorial to develop and deploy applications in the cloud and use OpenShift for your own Platform-as-a-Service.

Overview

  • Discover what the cloud is, tear through the marketing jargon, and go right to the...
Ning For Dummies (Computer/Tech)
Ning For Dummies (Computer/Tech)
Online social networks are part of modern life. Long gone are the days when MySpace, Facebook, and LinkedIn were a remote notion. Being a member of a social network has become an incredible way to connect (and reconnect) with other people who share your interests.

Until Ning was created, social networks offered members a space on the
...
SolidWorks 2011 Parts Bible
SolidWorks 2011 Parts Bible

SolidWorks as a topic of learning is a huge, sprawling expanse. There is a lot to know, and a lot to write about. While I have made every effort to be complete in this book, I'm sure there are some niche topics that have gone untreated. New in 2011, I have taken this book from a single volume of an immense scope to two individual volumes,...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy