Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Book of Ruby: A Hands-On Guide for the Adventurous
The Book of Ruby: A Hands-On Guide for the Adventurous

Ruby is famous for being easy to learn, but most users only scratch the surface of what it can do. While other books focus on Ruby's trendier features, The Book of Ruby reveals the secret inner workings of one of the world's most popular programming languages, teaching you to write clear, maintainable code.

...

Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

Webster's New World Hacker Dictionary
Webster's New World Hacker Dictionary
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace.

Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.

Cyberspace has a language all its own. Understanding it is vital
...
Oracle Database 11g Underground Advice for Database Administrators
Oracle Database 11g Underground Advice for Database Administrators

Today DBAs are expected to deploy and manage large databases with quality service and little to no downtime. The DBA's main focus is on increasing productivity and eliminating idle redundancy throughout the enterprise. However, there is no magic set of best practices or hard and fast rules that DBAs need to follow, and this can make life...

Encyclopedia of Cybercrime
Encyclopedia of Cybercrime
The first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime

There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and
...
PC Magazine Wireless Solutions
PC Magazine Wireless Solutions
Wireless is freedom. Wireless is now. And who better than PC Magazine to help you break free?

Wireless is more than cell phones. It's Web surfing from your deck, or tuning up your Xbox® to take on opponents on the opposite coast. But whatever wireless is, it isn't simple—or it wasn't, until these two guys made it so. Here's the...

Innocent Code : A Security Wake-Up Call for Web Programmers
Innocent Code : A Security Wake-Up Call for Web Programmers
This book is an entertaining read, that shows how to change your mindset from website construction to website destruction so as to avoid writing dangerous code.

This concise and practical book will show where code vulnerabilities lie and how best to fix them. Its value is in showing where code may be exploited to gain access to--or break...

Oracle Database 11g DBA Handbook (Osborne Oracle Press)
Oracle Database 11g DBA Handbook (Osborne Oracle Press)
The Essential Resource for Oracle DBAs--Fully Updated and Expanded

Manage a flexible, highly available Oracle database with help from the expert information contained in this exclusive Oracle Press guide. Fully revised to cover every new feature and utility, Oracle Database 11g DBA Handbook shows how to perform a new...

Ruby on Rails Tutorial: Learn Web Development with Rails (2nd Edition)
Ruby on Rails Tutorial: Learn Web Development with Rails (2nd Edition)

Ruby on Rails™ Tutorial by Michael Hartl has become a must-read for developers learning how to build Rails apps.”

Peter Cooper, Editor of Ruby Inside

 

Using Rails, developers can build...

Cisco LAN Switching Fundamentals
Cisco LAN Switching Fundamentals

The essential guide for understanding Ethernet switched networks

  • Understand various Ethernet technologies from 10BASE-T to Gigabit Ethernet

  • Learn about common switching modes, paths, and architectures

  • ...
GPRS in Practice : A Companion to the Specifications
GPRS in Practice : A Companion to the Specifications
GPRS is now an established technology allowing packet-data access to the internet and intranets and it is expected that consumer demand for the service will continue to increase, especially when the higher data rates are made available.

The GPRS technology is also carried forward to the 3G systems and it is vital that engineers working in...

Sams Teach Yourself SQL in 24 Hours (2nd Edition)
Sams Teach Yourself SQL in 24 Hours (2nd Edition)
Written by college instructors, Sams Teach Yourself SQL in 24 Hours quickly teaches beginning- to intermediate-level SQL users how to create, store, access and manipulate data using a proven step-by-step format that teaches SQL by example. This book contains a thorough explanation of database concepts, SQL procedures, and low-level programming,...
unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy