Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...

Game Programming All in One
Game Programming All in One

Create your own high-caliber games with some of the same tools used by professional game developers! If you have a working knowledge of C or C++, then "Game Programming All in One, 2nd Edition" can get you started on your journey. It uses hands-on projects to explain each new subject and includes many sample programs to reinforce...

Macs For Dummies
Macs For Dummies

Take a bite out of all your Mac has to offer with this bestselling guide

So, you joined the cool kids club and bought a Mac. Kudos! Now, do you dare admit to your sophisticated Mac mates that you still need some help figuring out how it works? No worries, Macs For Dummies is here to help! In full color for the first...

OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
3D Game Engine Design: A Practical Approach to Real-Time Computer Graphics
3D Game Engine Design: A Practical Approach to Real-Time Computer Graphics

The first edition of 3D Game Engine Design was an international bestseller that sold over 17,000 copies and became an industry standard. In the six years since that book was published, graphics hardware has evolved enormously. Hardware can now be directly controlled through techniques such as shader programming, which...

802.11 WLANs and IP Networking: Security, QoS, and Mobility
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.

“How do IEEE 802.11 wireless local area networks (WLANs) work together
with the
...
Build Your Own Ruby on Rails Web Applications
Build Your Own Ruby on Rails Web Applications
Ruby on Rails has shaken up the web development industry in a huge way—especially when you consider that version 1.0 of Rails was only released in December 2005. The huge waves of enthusiasm for the new framework, originally in weblogs and later in the more traditional media, are probably the reason why this book is in your hands.
...
Survey of Operating Systems
Survey of Operating Systems

Holcombe, "Survey of Operating Systems, 3e" is 'your foundation for IT Success!' McGraw-Hill is proud to introduce the third edition of Jane and Charles Holcombe's, "Survey of Operating Systems". This edition is a unique revision of the successful previous editions. Every chapter has been updated to include...

Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fast
Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fast

Zimbra is open-source server and client software for messaging and collaboration: email, group calendaring, contacts, and web document management and authoring. The Zimbra server is available for Linux, Mac OS X, appliances, and virtualization platforms. The Zimbra Web 2.0 Ajax client runs on Firefox, Safari, and IE, and features easy...

Meet the Kinect: An Introduction to Programming Natural User Interfaces (Technology in Action)
Meet the Kinect: An Introduction to Programming Natural User Interfaces (Technology in Action)

In this chapter you’ll unbox a new Kinect—or if you have one already, you’ll disconnect it from your Xbox. Then you’ll install some software, plug the Kinect into a computer, and take a look at what all of the fuss is about with this unique device. You’ll learn what the different components of the Kinect are and...

Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

Advanced Programming in the UNIX® Environment: Second Edition
Advanced Programming in the UNIX® Environment: Second Edition
"Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations...
Result Page: 82 81 80 79 78 77 76 75 74 73 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy