 |
|
|
 |  |  Understanding Swift Programming
Covers Swift 2
Swift, Apple's new language for app development, has been widely praised for its clean, safe, and feature-rich design. The language is poised to quickly replace Objective-C for developing iOS apps.
Swift is now the 14th most popular language (Objective-C is #18, having sunk like a stone from #3) as... |  |  UNIX System Programming for System VR4 (Nutshell Handbooks)
Any program worth its salt uses operating system services. Even a simple program, if practical, reads input and produces output. And, most applications have more complex needs. They need to find out the time, use the network, or start and communicate with other processes. Systems programming really means nothing more than writing... |
|
 CentOS 6 Linux Server Cookbook
An all-in-one guide to installing, configuring, and running a Centos 6 server. Ideal for newbies and old-hands alike, this practical tutorial ensures you get the best from this popular, enterprise-class free server solution.
-
Delivering comprehensive insight into CentOS server with a series of starting points that show you...
|  |  Unsupervised Learning with R
Work with over 40 packages to draw inferences from complex datasets and find hidden patterns in raw unstructured data
About This Book
-
Unlock and discover how to tackle clusters of raw data through practical examples in R
-
Explore your data and create your own models from scratch
... |  |  Citrix Access Gateway VPX 5.04 Essentials
A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX
Overview
-
A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
-
Establish secure access...
|
|
 Understanding Network Hacks: Attack and Defense with Python
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore... |  |  Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.
You'll learn how to configure your network from the ground up, starting by setting up your... |  |  |
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 |