Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies
Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies

The concept of Smart Cities is accurately regarded as a potentially transformative power all over the world. Bustling metropolises infused with the right combination of the Internet of Things, artificial intelligence, big data, and blockchain promise to improve both our daily lives and larger structural operations at a city...

A Practical Guide to Azure DevOps: Learn by doing - Third Edition
A Practical Guide to Azure DevOps: Learn by doing - Third Edition

DevOps has become a major topic for developers, testers, project managers and many others involved in building software products. Microsoft has introduced Azure DevOps as their tool for implementing DevOps practices. 

This book is intended to provide the reader a step-by-step, easy to follow guide...

Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
Beginning ASP Databases
Beginning ASP Databases
As a tutorial, Beginning ASP Databases offers an entry point to one of the most crucial aspects of Microsoft-oriented Web development--database integration with Active Server Pages. In Beginning ASP Databases, a trio of authors covers the basics of working with databases from ASP--especially using ActiveX Database Objects (ADO)....
Show Me You Care - The Power of Silence in Selling
Show Me You Care - The Power of Silence in Selling

The Power of Silence is immense.

Nothing establishes a closer connection or works better than silence and active listening. There is raw power to listening, hearing, and getting out of the way. When we let a buyer tell us what they want, vs. what we think they may need, long-lasting relationships are built. Silence and...

Machine Learning with Python: The Definitive Tool to Improve Your Python Programming and Deep Learning to Take You to The Next Level of Coding and Algorithms Optimization
Machine Learning with Python: The Definitive Tool to Improve Your Python Programming and Deep Learning to Take You to The Next Level of Coding and Algorithms Optimization

Machine learning is rapidly changing the world, from diverse types of applications and research pursued in industry and academia. 

Machine learning is affecting every part of your daily life. From voice assistants using NLP and machine learning to make appointments, check your calendar, and play music,...

How to Think About Algorithms
How to Think About Algorithms
There are many algorithm texts that provide lots of well-polished code and proofs of correctness. This book is not one of them. Instead, this book presents insights, notations, and analogies to help the novice describe and think about algorithms like an expert. By looking at both the big picture and easy step-by-step methods for developing...
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis...

Design for Software: A Playbook for Developers
Design for Software: A Playbook for Developers

A unique resource to help software developers create a desirable user experience

Today, top-flight software must feature a desirable user experience. This one-of-a-kind book creates a design process specifically for software, making it easy for developers who lack design background to create that compelling user experience....

Linux System Programming Techniques: Become a proficient Linux system programmer using expert recipes and techniques
Linux System Programming Techniques: Become a proficient Linux system programmer using expert recipes and techniques

Find solutions to all your problems related to Linux system programming using practical recipes for developing your own system programs

Key Features

  • Develop a deeper understanding of how Linux system programming works
  • Gain hands-on experience of working with different...
unlimited object storage image
Result Page: 236 235 234 233 232 231 230 229 228 227 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy