Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Essentials of Computer Architecture
Essentials of Computer Architecture

This easy to read textbook provides an introduction to computer architecture, while focusing on the essential aspects of hardware that programmers need to know. The topics are explained from a programmer’s point of view, and the text emphasizes consequences for programmers. Divided in five parts, the book covers the basics of digital...

Digital Forensics Basics: A Practical Guide Using Windows OS
Digital Forensics Basics: A Practical Guide Using Windows OS

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner...

Hands-On Enterprise Automation with Python.: Automate common administrative and security tasks with Python
Hands-On Enterprise Automation with Python.: Automate common administrative and security tasks with Python

Invent your own Python scripts to automate your infrastructure

Key Features

  • Make the most of Python libraries and modules to automate your infrastructure
  • Leverage Python programming to automate server configurations and administration tasks
  • Efficiently...
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices....

Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Exploring Abstract Algebra With Mathematica®
Exploring Abstract Algebra With Mathematica®
This upper-division laboratory supplement for courses in abstract algebra consists of several Mathematica packages programmed as a foundation for group and ring theory. Additionally, the "user's guide" illustrates the functionality of the underlying code, while the lab portion of the book reflects the contents of the...
Reporting with Microsoft SQL Server 2012 (Professional Experience Distilled)
Reporting with Microsoft SQL Server 2012 (Professional Experience Distilled)

Learn to quickly create reports in SSRS and Power View as well as understand the best use of each reporting tool

Overview

  • Empowers a highly visual design experience
  • Increase productivity and proactive intelligence through operational or ad hoc reports
  • Reporting with Microsoft...
Android Espresso Revealed: Writing Automated UI Tests
Android Espresso Revealed: Writing Automated UI Tests
Write Android user interface (UI) tests using Google Espresso for Android. You’ll cover all the major topics of writing functional UI automated tests using the Espresso testing framework, including different ways of running automated tests, architecting test projects in an easy and maintainable way, and using tools which help to...
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Atlas of Clinically Important Fungi
Atlas of Clinically Important Fungi

Although there are many texts that provide quality information for the identification of fungi, researchers and technologists rarely have time to read the text. Most are rushed for time and seek morphological information that helps guide them to the identification of fungi.

The Atlas of Clinically Important Fungi provides...

Augmented Learning: Research and Design of Mobile Educational Games
Augmented Learning: Research and Design of Mobile Educational Games
New technology has brought with it new tools for learning, and research has shown that the educational potential of video games resonates with scholars, teachers, and students alike. In Augmented Learning, Eric Klopfer describes the largely untapped potential of mobile learning games--games played on such handheld devices as cell phones,...
Oracle Database 12c Backup and Recovery Survival Guide
Oracle Database 12c Backup and Recovery Survival Guide

A comprehensive guide for every DBA to learn recovery and backup solutions

Overview

  • A practical reference to all Oracle backup and recovery options available, making it essential to any DBA in the world
  • A valuable guide for readers on the most frequent backup and recovery scenarios they can...
Result Page: 42 41 40 39 38 37 36 35 34 33 
┬ę2019 LearnIT (support@pdfchm.net) - Privacy Policy