Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Securing PHP Apps
Securing PHP Apps

Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.

Is your PHP app truly secure? Let's make sure you get home...

Complex Variables Demystified
Complex Variables Demystified
Complex variables, and its more advanced version, complex analysis, is one of the most fascinating areas in pure and applied mathematics. It all started when mathematicians were mystified by equations that could only be solved if you could take the square roots of negative numbers. This seemed bizarre, and back then nobody could imagine that...
Compliers and Compiler Generators: An Introduction With C++
Compliers and Compiler Generators: An Introduction With C++
This book has been written to support a practically oriented course in programming language translation for senior undergraduates in Computer Science. More specifically, it is aimed at students who are probably quite competent in the art of imperative programming (for example, in C++, Pascal, or Modula-2), but whose mathematics may be a little...
Knowledge Integration: The Practice of Knowledge Management in Small and Medium Enterprises
Knowledge Integration: The Practice of Knowledge Management in Small and Medium Enterprises
The ability to manage knowledge is relevant for millions of small and medium sized enterprises (SMEs) that operate in high-tech environments. They strongly depend on external knowledge about customers, technologies, and competitors because, as opposed to large companies, they have limited internal knowledge resources and little power to control...
Java Secrets
Java Secrets
Java is generally a well-documented language, but not every language feature is fully specified, documented, or identical across all platforms. Java Secrets takes you into this Java twilight zone and introduces you to the language's hidden power. The book's first section explores the inner workings of many Java mechanisms, including...
The Semantic Web: A Guide to the Future of XML, Web Services, and Knowledge Management
The Semantic Web: A Guide to the Future of XML, Web Services, and Knowledge Management
A strategic guide to the revolutionary framework that will change the way you do business

Imagine if you could teach your computer to make decisions that lead to faster B2B trading implementations, more effective customer management, and seamless data warehousing. Now, your imagination can be turned into reality. This authoritative book...

An Introduction to Geographical Information Systems (3rd Edition)
An Introduction to Geographical Information Systems (3rd Edition)

Your encounters with GIS to date may be similar to those of a Martian arriving on Earth and being faced with a motor car. Imagine a Martian coming to Earth and stumbling across a motor car showroom. Very soon he (or she) has heard of a ‘car’ and may even have seen a few glossy brochures. Perhaps you are in the same...

Internet Psychology (The Basics)
Internet Psychology (The Basics)

We can't imagine our lives without the Internet. It is the tool of our existence; without it we couldn't work, plan our social and leisure activities, and interact with friends. The Internet’s influence on contemporary society extends across every aspect of our personal and professional lives, but how has this altered us in...

Producing Great Sound for Digital Video
Producing Great Sound for Digital Video
Producing Great Sound for Digital Video educates beginning and experienced filmmakers on the intricacies of creating an outstanding soundtrack, from preproduction planning through the final mix.

The entire book is fascinating: it's absolutely packed with useful information and tips. Most of us remember learning in high school physics...

Mahara 1.2 E-Portfolios: Beginner's Guide
Mahara 1.2 E-Portfolios: Beginner's Guide

Mahara is a user-centred environment with a permissions framework that enables different views of an e-portfolio to be easily managed. These views helps you display your artefacts - text files, spreadsheets, images, and videos - in a way you choose and to the people you want. You can also create online communities and social networks through...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Result Page: 21 20 19 18 17 16 15 14 13 12 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy