Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Docker in Practice
Docker in Practice

Summary

An open source container system, Docker makes deploying applications painless and flexible. Docker is powerful and simple to use, and it makes life easier for developers and administrators alike providing shorter build times, fewer production bugs, and effortless application roll-out.

About...

HTML & Web Design Tips & Techniques
HTML & Web Design Tips & Techniques
Master HTML and Web design using this resource filled with precise, proven techniques from today?s leading industry experts. Inside you?ll find quick and concise solutions that can be put to immediate use easily and effectively. Organized by topic and packed with critical information this is a must-have guide for every Web designer....
Seamless R and C++ Integration with Rcpp (Use R!)
Seamless R and C++ Integration with Rcpp (Use R!)
Rcpp is the glue that binds the power and versatility of R with the speed and efficiency of C++.  With Rcpp, the transfer of data between R and C++ is nearly seamless, and high-performance statistical computing is finally accessible to most R users.  Rcpp should be part of every statistician's toolbox.  -- Michael...
Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Beginning SQL Server R Services: Analytics for Data Scientists
Beginning SQL Server R Services: Analytics for Data Scientists

Learn how to develop powerful data analytics applications quickly for SQL Server database administrators and developers. Organizations will be able to sift data and derive the business intelligence needed to drive business decisions and profit. The addition of R to SQL Server 2016 places a powerful analytical processor into an...

Networking For Dummies (Computer/Tech)
Networking For Dummies (Computer/Tech)
The #1 bestselling beginner's guide to computer networking—now in a new edition

Need networking know-how, but don't know where to turn? Run—don't walk—to the no-nonsense networking guidance offered in this friendly guide! Whether you're a networking administrator or an everyday computer user...

Hacking: How to Hack Computers, Basic Security and Penetration Testing
Hacking: How to Hack Computers, Basic Security and Penetration Testing

Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught?

Download Hacking to discover everything you need to know about hacking.

Step by step to increase your hacking skill set. Learn how to penetrate computer...

Industrial Applications of Evolutionary Algorithms (Intelligent Systems Reference Library)
Industrial Applications of Evolutionary Algorithms (Intelligent Systems Reference Library)

"Industrial applications of evolutionary algorithms" is intended as a resource for both experienced users of evolutionary algorithms and researchers that are beginning to approach these fascinating optimization techniques.

Experienced users will find interesting details of real-world problems, advice on solving...

MongoDB in Action: Covers MongoDB version 3.0
MongoDB in Action: Covers MongoDB version 3.0

Summary

MongoDB in Action, Second Edition is a completely revised and updated version. It introduces MongoDB 3.0 and the document-oriented database model. This perfectly paced book gives you both the big picture you'll need as a developer and enough low-level detail to satisfy system engineers.

...
Result Page: 136 135 134 133 132 131 130 129 128 127 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy