Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PowerShell and Python Together: Targeting Digital Investigations
PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.

You will learn how to join PowerShell's robust set of commands and access to the
...
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Pro SQL Server on Linux: Including Container-Based Deployment with Docker and Kubernetes
Get SQL Server up and running on the Linux operating system and containers. No database professional managing or developing SQL Server on Linux will want to be without this deep and authoritative guide by one of the most respected experts on SQL Server in the industry. Get an inside look at how SQL Server for Linux works through the...
Expert MySQL (Expert's Voice in Databases)
Expert MySQL (Expert's Voice in Databases)

Expert MySQL is the leading reference for learning, understanding, and extending the MySQL server. It unlocks the full promise of open source by showing how to modify the code, create your own storage engine, build your own authentication plugins, and even add your own functions and commands to the SQL language. No other book...

Artificial Neural Networks with Java: Tools for Building Neural Network Applications
Artificial Neural Networks with Java: Tools for Building Neural Network Applications
Use Java to develop neural network applications in this practical book. After learning the rules involved in neural network processing, you will manually process the first neural network example. This covers the internals of front and back propagation, and facilitates the understanding of the main principles of neural...
iText in Action
iText in Action

With iText, one can transform PDF documents into live, interactive applications quickly and easily. This free and open source library for Java and .NET is the leading tool of its kind, and was primarily developed and maintained by Bruno Lowagie, the author of this book.

iText in Action, Second Edition offers an...

Expert SQL Server Transactions and Locking: Concurrency Internals for SQL Server Practitioners
Expert SQL Server Transactions and Locking: Concurrency Internals for SQL Server Practitioners
Some time ago, one of my colleagues asked me, “What do you like about SQL Server the most?” I had heard this question many times before, and so I provided my usual answer: “SQL Server Internals. I like to understand how the product works and solve complex problems with this knowledge.”

His
...
Clojure High Performance Programming
Clojure High Performance Programming

Written for intermediate Clojure developers, this compact guide will raise your expertise several notches. It tackles all the fundamentals of analyzing and optimizing performance in clear, logical chapters.

Overview

  • See how the hardware and the JVM impact performance
  • Learn which Java...
Arduino Internals
Arduino Internals

Let's investigate the inner-workings of your Arduino. It appears to be a simple machine, but it is not. Much effort has been invested to make it easy to learn and use. Unfortunately, these good intentions can mask some of the Arduino's underlying capabilities. You suspected that there was more, much more, under the simplistic...

Metaprogramming Elixir: Write Less Code, Get More Done (and Have Fun!)
Metaprogramming Elixir: Write Less Code, Get More Done (and Have Fun!)

Write code that writes code with Elixir macros. Macros make metaprogramming possible and define the language itself. In this book, you'll learn how to use macros to extend the language with fast, maintainable code and share functionality in ways you never thought possible. You'll discover how to extend Elixir with your own first-class...

Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
Inside Microsoft SQL Server 2005: T-SQL Querying
Inside Microsoft SQL Server 2005: T-SQL Querying
A comprehensive, hands-on reference for database developers and administrators, this book focuses on advanced querying techniques using Transact-SQL (T-SQL), the database programming language built into SQL Server. Includes code and table examples.

Key Book Benefits:
  • Delivers practical, hands-on guidance on...
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Result Page: 18 17 16 15 14 13 12 11 10 9 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy