Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nokia Smartphone Hacks
Nokia Smartphone Hacks
Nokia's smartphones pack a powerful computer into a very small space. Unlike your desktop or laptop, your smallest computer can be connected to the Internet all the time, and can interact with the world around it through its camera, voice recognition, and its traditional phone keypad. Nokia smartphones combine these features with impressive storage...
Developer's Guide to Web Application Security
Developer's Guide to Web Application Security
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.

This book defines Web application security, why it should be
...
Effective Unit Testing: A guide for Java developers
Effective Unit Testing: A guide for Java developers

Summary

Effective Unit Testing is written to show how to write good tests—tests that are concise and to the point, expressive, useful, and maintainable. Inspired by Roy Osherove's bestselling The Art of Unit Testing, this book focuses on tools and practices specific to the Java world. It...

eBay Hacks: 100 Industrial-Strength Tips and Tools, First Edition
eBay Hacks: 100 Industrial-Strength Tips and Tools, First Edition
Whether you're a newcomer or longtime user, eBay Hacks will teach you to become efficient as both a buyer and seller. You'll find a wide range of topics, from monitoring the bidding process, getting refunds, and fixing photos so that sale items look their best, to in-depth tips for running a business on eBay and...
Using Moodle: Teaching with the Popular Open Source Course Management System
Using Moodle: Teaching with the Popular Open Source Course Management System
Developed by an extremely active open source community, Moodle is a sophisticated course management system that's ideal for creating dynamic online learning communities
and for supplementing face-to-face learning. Used in more than 115 countries and supporting over 60 languages, Moodle can scale from a single-teacher site to a 40,000-
...
Hacking Exposed 7: Network Security Secrets and Solutions
Hacking Exposed 7: Network Security Secrets and Solutions

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...

Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
This serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:

  • Shows you how to speed it up, lock it down, or pull back the curtains.
  • Dives into default system settings,...
Deep Learning Essentials: Your hands-on guide to the fundamentals of deep learning and neural network modeling
Deep Learning Essentials: Your hands-on guide to the fundamentals of deep learning and neural network modeling

Get to grips with the essentials of deep learning by leveraging the power of Python

Key Features

  • Your one-stop solution to get started with the essentials of deep learning and neural network modeling
  • Train different kinds of neural networks to tackle various problems in...
The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

Car Hacks and Mods for Dummies
Car Hacks and Mods for Dummies

So you want to turn your Yugo into a Viper? Sorry--you need a certified magician. But if you want to turn your sedate sedan into a mean machine or your used car lot deal into a powerful, purring set of wheels, you’ve come to the right place. Car Hacks & Mods for Dummies will get you turbo-charged up about modifying your car...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy