Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Two Scoops of Django: Best Practices For Django 1.5
Two Scoops of Django: Best Practices For Django 1.5

Update!

The third edition, Two Scoops of Django: Best Practices For Django 1.8 is available! Revised and expanded to 532 pages, it's a whole new book full of new material. Please consider it before purchasing this edition!

http://www.amazon.com/Two-Scoops-Django-Best-Practices/dp/0981467342

...
Getting Started with OpenShift
Getting Started with OpenShift

Intrigued by the possibilities of developing web applications in the cloud? With this concise book, you get a quick hands-on introduction to OpenShift, the open source Platform as a Service (PaaS) offering from Red Hat. You’ll learn the steps necessary to build, deploy, and host a complete real-world application on OpenShift,...

Google Hacks: 100 Industrial-Strength Tips & Tools
Google Hacks: 100 Industrial-Strength Tips & Tools
Google Hacks is a collection of industrial-strength, real-world, tested solutions to practical problems. This concise book offers a variety of interesting ways for power users to mine the enormous amount of information that Google has access to, and helps you have fun while doing it. You'll learn clever and...
Functional Programming: A PragPub Anthology: Exploring Clojure, Elixir, Haskell, Scala, and Swift
Functional Programming: A PragPub Anthology: Exploring Clojure, Elixir, Haskell, Scala, and Swift

Explore functional programming and discover new ways of thinking about code. You know you need to master functional programming, but learning one functional language is only the start. In this book, through articles drawn from PragPub magazine and articles written specifically for this book, you'll explore functional...

SUSE Linux 9 Bible
SUSE Linux 9 Bible
If SUSE Linux 9 can do it, you can do it, too ...

SUSE is the oldest commercial Linux distribution, favored in Europe and rapidly gaining popularity in the United States. Whether you're just discovering Linux or switching from another distribution, this comprehensive reference gives you not only the "how-to" information, but also...

SUSE Linux 10 For Dummies (Computer/Tech)
SUSE Linux 10 For Dummies (Computer/Tech)
SUSE Linux is an increasingly popular Linux distribution that competes headon
with Red Hat’s Linux versions. SUSE Linux’s fortunes have been on the
rise following Novell’s acquisition of Germany’s SUSE Linux AG and the recent
initiation of the openSUSE project (www.opensuse.org) — an open source...
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

Getting Started with Red Hat Enterprise Virtualization
Getting Started with Red Hat Enterprise Virtualization

Leverage powerful Red Hat Enterprise Virtualization solutions to build your own IaaS cloud

About This Book

  • Build an agile, secure, and highly scalable virtualization foundation for your enterprise Linux and Windows workloads
  • Explore how Red Hat Enterprise Virtualization positions itself...
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Programming Microsoft SQL Server 2000 with Microsoft Visual Basic .NET
Programming Microsoft SQL Server 2000 with Microsoft Visual Basic .NET
Learn how to turn data into solutions with SQL Server 2000, Visual Basic .NET, and XML. Get a fundamental grasp of SQL Server 2000 data access, data manipulation, and data definition T-SQL programming techniques, Visual Basic .NET language enhancements, Microsoft Visual Studio .NET integrated development environment advances, and the...
Professional Search Engine Optimization with PHP: A Developer's Guide to SEO
Professional Search Engine Optimization with PHP: A Developer's Guide to SEO
Professional Search Engine Optimization with PHP

Search engine optimization (SEO) is not only the job of the marketing department. It must be considered from a web site's inception and throughout its lifetime by you, the web site developer. Making changes to the architecture of a web site and modifying presentation techniques...

Result Page: 21 20 19 18 17 16 15 14 13 12 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy