Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C in Depth
C in Depth
In the third edition of the book C in depth , the authors explain the basics of the programming language while maintaining the integrity and clarity of the programs. The book can be utilized by both beginners and advanced level programmers as a self-evaluation and learning source. There are more than 310 programs with explanations to illustrate...
Concepts of Database Management
Concepts of Database Management
This concise yet comprehensive introduction to fundamental database concepts is an indispensable resource to develop your knowledge of database management concepts. Now in its sixth edition, Concepts of Database Management maintains the focus on real-world cases that made previous editions so effective addressing the most current database issues...
Microsoft Sql Server 2012 Master Data Services 2/E
Microsoft Sql Server 2012 Master Data Services 2/E

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Deploy and Maintain an Integrated MDS Architecture

Harness your master data and grow revenue while reducing...

T-SQL Fundamentals (3rd Edition)
T-SQL Fundamentals (3rd Edition)

Effectively query and modify data using Transact-SQL
Master T-SQL fundamentals and write robust code for Microsoft SQL Server and Azure SQL Database. Itzik Ben-Gan explains key T-SQL concepts and helps you apply your knowledge with hands-on exercises. The book first introduces
...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust...
Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...

Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

Computer Forensics with FTK
Computer Forensics with FTK

Written by a specialist in digital crime, this book helps you leverage the power of the FTK platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.

About This Book

  • Receive step-by-step guidance on conducting computer...
Complete PCB Design Using OrCad Capture and Layout
Complete PCB Design Using OrCad Capture and Layout
Complete PCB Design Using OrCAD Capture and Layout is the first book to offer a complete guide on how to use the OrCAD design suite to design and manufacture printed circuit boards. Professionals and students will find this book to be an easily accessible resource covering topics from the basic PCB design principles to advanced levels of specific...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy