Home | Amazing | Today | Tags | Publishers | Years | Search 
The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Smart Home Automation with Linux (Expert's Voice in Linux)
Smart Home Automation with Linux (Expert's Voice in Linux)

Linux users can now control their homes remotely! Are you a Linux user who has ever wanted to turn on the lights in your house, or open and close the curtains, while away on holiday? Want to be able to play the same music in every room, controlled from your laptop or mobile phone? Do you want to do these things without an expensive...

Hacking Vim 7.2
Hacking Vim 7.2

Vim is one of the most powerful open-source editors used by programmers and system administrators around the world. While Vim itself is inherently a powerful editor, personalizing it to suit your needs can be a daunting task. However, it is possible to do so with the help of this book.

This book contains examples that cover...

From Russia with Tough Love: Pavel's Kettlebell Workout for a Femme Fatale
From Russia with Tough Love: Pavel's Kettlebell Workout for a Femme Fatale

In Russia, kettlebells have long been revered as the fitness-tool of choice for Olympic athletes, elite special forces and martial artists. The kettlebell’s ballistic movement challenges the body to achieve an unparalleled level of physical conditioning and overall strength.

But until now, the astonishing benefits of the...

Pragmatic Guide to JavaScript (Pragmatic Guides)
Pragmatic Guide to JavaScript (Pragmatic Guides)

The JavaScript ecosystem can be tough to hack through, even for experienced programmers. There are so many extensive JavaScript reference books and competing libraries to choose from-Prototype, jQuery, MooTools, YUI, Dojo, ExtJS, and so on.

Christophe Porteneuve is here to help: he gives you fundamentals, the most
...

Hack Proofing ColdFusion
Hack Proofing ColdFusion

In preparation for the creation of this book I spent a weekend at my home in Massachusetts setting up one of my personal computers to be a testing server. My home is serviced by AT&T and we have a high-speed modem with a fixed IP number.This, combined with the installation of some new software, made for a very fun weekend of tweaking and...

Facebook: The Missing Manual (Missing Manuals)
Facebook: The Missing Manual (Missing Manuals)

Facebook's spreading about as far and fast as the Web itself: 500 million members and counting. But there's a world of fun packed into the site that most folks miss. With this bestselling guide, learn how to unlock Facebook's talents as personal website creator, souped-up address book, and bustling community forum....

Joomla! VirtueMart 1.1 Theme and Template Design
Joomla! VirtueMart 1.1 Theme and Template Design

Since you picked this book, the odds will be that you are already familiar with Joomla! VirtueMart. You will agree that this open source e-commerce solution is definitely amazing and feature-rich. That's why you want to stick with it. However, you still find there are some things here and there that don't quite fit your requirements....

Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Coding Theory

This book is based on a course in cryptography at the upper level under graduate and beginning graduate level that has been given at the University of Maryland since 1997. When designing the course, we decided on the fol lowing requirements.

• The course should be up-to-date and cover a broad selection of topics from a...

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...

Using Mac OS X Lion Server: Managing Mac Services at Home and Office
Using Mac OS X Lion Server: Managing Mac Services at Home and Office
People often ask me if I think Apple is a company that knows how to make a good server. My answer is usually a little longer than what those people probably had in mind. Tim Berners-Lee wrote the first web server in 1989 on a computer running the NeXTSTEP operating system. At the time, NeXTSTEP was a fledgling,...
Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Coding Theory

This book is based on a course in cryptography at the upper-level under- graduate and beginning graduate level that has been given at the University of Maryland since 1997, and a course that bos been taught at Rutgers Uni- versity since 2003. When designing the courses, we decided on the following requirements:

• The
...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy