Home | Amazing | Today | Tags | Publishers | Years | Search 
The Definitive Guide to Catalyst: Writing Extensible, Scalable and Maintainable Perl Based Web Applications
The Definitive Guide to Catalyst: Writing Extensible, Scalable and Maintainable Perl Based Web Applications
I have been with the Catalyst framework team since the beginning. We have come a long way from our beginnings as a few guys in an IRC channel trying to hack together a better way to write web applications. Catalyst is now powering multi-million-dollar sites all over the world. It has a thriving community of developers, with thousands of people...
Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Dungeon Master 4th Edition For Dummies
Dungeon Master 4th Edition For Dummies
Whether you've been a Dungeon Master (DM) before and want to fine-tune your skills or want to get ready and take the plunge, this is the book for you. It gives you the basics on running a great game, info for more advanced dungeon mastering, guidelines for creating adventures, and tips for building a campaign. It shows you how to:
The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Smart Home Automation with Linux (Expert's Voice in Linux)
Smart Home Automation with Linux (Expert's Voice in Linux)

Linux users can now control their homes remotely! Are you a Linux user who has ever wanted to turn on the lights in your house, or open and close the curtains, while away on holiday? Want to be able to play the same music in every room, controlled from your laptop or mobile phone? Do you want to do these things without an expensive...

Macworld's Mac Security Superguide
Macworld's Mac Security Superguide

Macworld's Mac Security Superguide

Keep your data and computer safe.

The expert team of Macworld editors share their knowledge in this essential guide to keep your computer, your network, and your personal information safe and secure; further your head start when it comes to malware, get tips to keep your...

Remix and Life Hack in Hip Hop: Towards a Critical Pedagogy of Music (Youth, Media, and Culture)
Remix and Life Hack in Hip Hop: Towards a Critical Pedagogy of Music (Youth, Media, and Culture)

Many hiphoppas labour to sustain Hiphop Kulture in their communities far from the big stages, world tours, and hit singles enjoyed by a shockingly few American hiphoppas. The creative labour of these few mega stars is calculated in billions of dollars. But for most hiphoppas, their creative labour may never get expressed in economic terms....

Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Beginning Windows 10: Do More with Your PC
Beginning Windows 10: Do More with Your PC

Beginning Windows 10 takes you through the new features of this amazing new operating system, revealing some of its surprising capabilities, and helping you customize it to suit you. Whether you are new to Windows, or you want to get up to speed with the latest features and changes, this book has everything you need to get started.

...
The Emergence of Video Processing Tools: Television Becoming Unglued
The Emergence of Video Processing Tools: Television Becoming Unglued

The Emergence of Video Processing Tools presents stories of the  development of early video tools and systems designed and built by  artists and technologists during the late 1960s and ’70s. Split over two volumes, the contributors examine the intersection of art and science and look at collaborations...

Carry On: Sound Advice from Schneier on Security
Carry On: Sound Advice from Schneier on Security

Up-to-the-minute observations from a world-famous security expert

Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy