Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Wilderness of Wildlife Tourism (Advances in Hospitality and Tourism)
Wilderness of Wildlife Tourism (Advances in Hospitality and Tourism)

Wildlife tourism is a growing multimillion-dollar industry within the hospitality and tourism industry. Wildlife tourism, in its simplest sense, is the creation of tour packages for watching wild animals in their natural habitats, and is particularly important in African and South American countries, Australia, India, Canada, Indonesia,...

Learning Continuous Integration with Jenkins
Learning Continuous Integration with Jenkins

Key Features

  • Speed up and increase software productivity and software delivery using Jenkins
  • Automate your build, integration, release, and deployment processes with Jenkins―and learn how continuous integration (CI) can save you time and money
  • Explore the power of continuous delivery...
Cardiovascular Disease, Volume 2: Molecular Medicine (Methods in Molecular Medicine)
Cardiovascular Disease, Volume 2: Molecular Medicine (Methods in Molecular Medicine)

Cardiovascular disease is the leading cause of death in developed countries, but is quickly becoming an epidemic in such well-populated countries as China, India, and other developing nations. Cardiovascular research is the key to the prevention, diagnosis, and management of cardiovascular disease. Vigorous and cross-disciplinary approaches...

Queenpins: Notorious Women Gangsters of The Modern Era
Queenpins: Notorious Women Gangsters of The Modern Era

The cut throat world of organized crime has long been dominated by men, and such macho godfathers and kingpins as Al Capone, John Dillinger, Pablo Escobar and John Gotti have become legendary. Yet, dig deep into the annals of crime and one can find smart, ambitious and ruthless women who have cracked the glass ceiling of the underworld and...

Unreal Engine 4 Game Development Essentials
Unreal Engine 4 Game Development Essentials

Key Features

  • Get to grips with the user interface of Unreal Engine 4 and find out more about its various robust features
  • Create dream video games with the help of the different tools Unreal Engine 4 offers
  • Create video-games and fully utilize the power of Unreal Engine 4 to bring games to...
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing...

Python Unlocked
Python Unlocked

Key Features

  • Write smarter, bug-free, high performance code with minimal effort
  • Uncover the best tools and options available to Python developers today
  • Deploy decorators, design patters, and various optimization techniques to use Python 3.5 effectively

Book...

Advances in Intelligent Informatics (Advances in Intelligent Systems and Computing)
Advances in Intelligent Informatics (Advances in Intelligent Systems and Computing)
The third International Symposium on Intelligent Informatics (ISI-2014) provided a forum for sharing original research results and practical development experiences among experts in the emerging areas of Intelligent Informatics. This edition was co-located with third International Conference on Advances in Computing, Communications...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
Even if the NFC standard is young (developed in 2004), I have been asked to write this book for several years now, due to the pioneering role played in France (and in Europe) by our Computer Science Master’s degree MBDS (www.mbds-fr.org) at the University of Nice – Sophia-Antipolis around the prototyping of innovative...
Art and Form: From Roger Fry to Global Modernism (Refiguring Modernism)
Art and Form: From Roger Fry to Global Modernism (Refiguring Modernism)

This important new study reevaluates British art writing and the rise of formalism in the visual arts from 1900 to 1939. Taking Roger Fry as his starting point, Sam Rose rethinks how ideas about form influenced modernist culture and the movement’s significance to art history today.

In the context of modernism,...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy