Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Dynamic SQL: Applications, Performance, and Security in Microsoft SQL Server
Dynamic SQL: Applications, Performance, and Security in Microsoft SQL Server

Take a deep dive into the many uses of dynamic SQL in Microsoft SQL Server. This edition has been updated to use the newest features in SQL Server 2016 and SQL Server 2017 as well as incorporating the changing landscape of analytics and database administration. Code examples have been updated with new system objects and functions to...

Hacking Exposed Wireless, Second Edition
Hacking Exposed Wireless, Second Edition

The latest wireless security solutions

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily...

Atlas of Ultrasound Guided Musculoskeletal Injections (Musculoskeletal Medicine)
Atlas of Ultrasound Guided Musculoskeletal Injections (Musculoskeletal Medicine)

The use of ultrasound guidance to perform diagnostic and therapeutic injections is growing at a rapid rate, as is the evidence to support its use. Even with the increased popularity of ultrasound, there remains a lack of formal training or a standard reference book. Atlas of Ultrasound Guided Musculoskeletal Injections fills this void...

Scala Functional Programming Patterns
Scala Functional Programming Patterns

Grok and perform effective functional programming in Scala

About This Book

  • Understand functional programming patterns by comparing them with the traditional object-oriented design patterns
  • Write robust, safer, and better code using the declarative programming paradigm
  • An...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Pro JSF and HTML5: Building Rich Internet Components
Pro JSF and HTML5: Building Rich Internet Components

Pro JSF and HTML5 shows you how to leverage the full potential of JavaServer Faces (JSF) and HTML5. This book is for Java developers who aspire to build sophisticated, enterprise-grade web experiences with HTML5-enabled JSF. Written by JSF experts and verified by established community figures, this book will serve as your primary resource,...

Light and Heavy Vehicle Technology, Fourth Edition
Light and Heavy Vehicle Technology, Fourth Edition
This best-selling book provides the reader with a complete text and reference to the design, construction and operation of the many and varied components of modern motor vehicles, equipping them with the knowledge they need to deal with their servicing and repair. Covering both cars and heavier vehicles and featuring over 1000 illustrations, this...
Java EE 8 Recipes: A Problem-Solution Approach
Java EE 8 Recipes: A Problem-Solution Approach

The Java platform is one of the most widely used platforms for application development in the world. The platform is so popular that there are several different flavors of Java that can be used for developing applications that run on different mediums. From development of desktop, mobile, or web applications and hardware operating systems,...

Google Guice: Agile Lightweight Dependency Injection Framework (Firstpress)
Google Guice: Agile Lightweight Dependency Injection Framework (Firstpress)
Guice (pronounced “Juice”) is the Jolt Award winning, 100% Java icing on the cake of Java dependency injection. Unlike other popular DI frameworks such as Spring, Guice fully embraces modern Java language features and combines simplicity with stunning performance and developer–friendliness.

Google Guice: Agile Lightweight...

Web Application Obfuscation
Web Application Obfuscation

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web...

Mastering Web Application Development with AngularJS
Mastering Web Application Development with AngularJS

Streamline your web applications with this hands-on course. From initial structuring to full deployment, you'll learn everything you need to know about AngularJS DOM based frameworks.

Overview

  • Make the most out of AngularJS by understanding the AngularJS philosophy and applying it to real life...
Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)
Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy