Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Object-Oriented and Classical Software Engineering
Object-Oriented and Classical Software Engineering

Almost every computer science and computer engineering curriculum now includes a required team-based software development project. In some cases, the project is only one semester or quarter in length, but a year-long team-based software development project is fast becoming the norm.

In an ideal world, every student would...

Learning Nessus for Penetration Testing
Learning Nessus for Penetration Testing

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment

Overview

  • Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
  • ...
The Definitive Guide to SUSE Linux Enterprise Server 12
The Definitive Guide to SUSE Linux Enterprise Server 12

The Definitive Guide to SUSE Linux Enterprise Server 12 is a task-oriented book designed for self-study as well as classroom environments, which will also serve you as a reference guide. The book covers all skills that system administrators typically need to posses to administer SUSE Linux Enterprise Server in corporate environments....

Sliding Mode Control and Observation (Control Engineering)
Sliding Mode Control and Observation (Control Engineering)

The sliding mode control methodology has proven effective in dealing with complex dynamical systems affected by disturbances, uncertainties and unmodeled dynamics. Robust control technology based on this methodology has been applied to many real-world problems, especially in the areas of aerospace control, electric power systems,...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Hands-On Design Patterns with React Native: Proven techniques and patterns for efficient native mobile development with JavaScript
Hands-On Design Patterns with React Native: Proven techniques and patterns for efficient native mobile development with JavaScript

Learn how to write cross platform React Native code by using effective design patterns in the JavaScript world. Get to know industry standard patterns as well as situational patterns. Decouple your application with these set of “Idea patterns”.

Key Features

  • Mobile development...
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity

Create simple to advanced shell scripts and enhance your system functionality with effective recipes

Key Features

  • Automate tedious and repetitive tasks
  • Create several novel applications ranging from a simple IRC logger to a Web Scraper
  • Manage your system...
Openvpn: Building And Integrating Virtual Private Networks
Openvpn: Building And Integrating Virtual Private Networks
OpenVPN is an outstanding piece of software that was invented by James Yonan in the year 2001 and has steadily been improved since then. No other VPN solution offers a comparable mixture of enterprise-level security, usability, and feature richness. We have been working with OpenVPN for many years now, and it has always proven to be the best...
Practical Guide to Inspection, Testing and Certification of Electrical Installations: Conforms to IEE Wiring Regulations / BS 7671 / Part P of Building Regulations
Practical Guide to Inspection, Testing and Certification of Electrical Installations: Conforms to IEE Wiring Regulations / BS 7671 / Part P of Building Regulations
This book covers all the basics of inspection and testing and clearly explains all the legal requirements. It not only tells you what tests are needed but also describes all of them step-by-step with the help of colour photos. Sample forms show how to verify recorded test results and how to certify and fill in the required documentation. The book...
DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies
DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies

Explore the high-in demand core DevOps strategies with powerful DevOps tools such as Ansible, Jenkins, and Chef

Key Features

  • Get acquainted with methodologies and tools of the DevOps framework
  • Perform continuous integration, delivery, deployment, and monitoring using...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Advanced Polymeric Systems: Applications in Nanostructured Materials, Composites and Biomedical Fields (River Publishers Series in Polymer Science)
Advanced Polymeric Systems: Applications in Nanostructured Materials, Composites and Biomedical Fields (River Publishers Series in Polymer Science)
Over recent years a considerable amount of effort has been devoted, both in industry and academia, towards the incorporation of various macro, micro, and nano sized fillers into polymers. There is also much interest in the evaluation of various polymer properties with respect to a wide set of applications. The advances in nanotechnology...
unlimited object storage image
Result Page: 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy