Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking del.icio.us
Hacking del.icio.us
I wrote this book with tinkerers in mind—that is to say, tinkerers of various levels of familiarity with del.icio.us in particular and Web development skill in general.Whether you’re just getting on your way to being a power user at del.icio.us, or whether you’re a hardcore Web development guru who’s running your own...
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing
World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing

"Richard Hunter has seen the future, and its really scary. If you ever plan to do anything wrong, you need to read this book. If you suspect that someone will ever try to do anything wrong to you, you also need to read it. I believe that covers pretty much all of us." —Thomas H. Davenport, Director, Accenture Institute for...

Parallel Algorithm Derivation and Program Transformation
Parallel Algorithm Derivation and Program Transformation
Transformational programming and parallel computation are two emerging fields that may ultimately depend on each other for success. Perhaps because ad hoc programming on sequential machines is so straightforward, sequential programming methodology has had little impact outside the academic community, and transformational methodology has had little...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

sendmail, 3rd Edition
sendmail, 3rd Edition
The new edition of sendmail has been completely revised to cover sendmail 8.12--a version with more features and fundamental changes than any previous version of the Unix-based email routing program. Because the latest version of sendmail differs so significantly from earlier versions, a massive rewrite of this...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Building on the success of its storefront and fulfillment services, Amazon now allows businesses to "rent" computing power, data storage and bandwidth on its vast network platform. This book demonstrates how developers working with small- to mid-sized companies can take advantage of Amazon Web Services (AWS) such as the Simple Storage...
JBoss in Action: Configuring the JBoss Application Server
JBoss in Action: Configuring the JBoss Application Server
JBoss in Action is the first book to focus on teaching readers in detail how to use the JBoss application server. Unlike other titles about JBoss, the authors of JBoss in Action go deeper into the advanced features and configuration of the server. In particular, it focuses on enterprise-class topics, such as high availability,...
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems...
How Do Hybrid Cars Work? (Science in the Real World)
How Do Hybrid Cars Work? (Science in the Real World)

In recent years, there has been much concern about the world's reliance on nonrenewable resources, such as oil. Scientists are attempting to decrease our dependency on oil - something cars require to work. Hybrid cars, which run on alternative energy sources like sunlight, corn, and biofuels, may be the key to using less oil. "How Do Hybrid...

The LEGO MINDSTORMS EV3 Idea Book: 181 Simple Machines and Clever Contraptions
The LEGO MINDSTORMS EV3 Idea Book: 181 Simple Machines and Clever Contraptions

The LEGO® MINDSTORMS® EV3 Idea Book explores dozens of creative ways to build amazing mechanisms with the LEGO MINDSTORMS EV3 set. Each model includes a list of the required parts, minimal text, and colorful photographs from multiple angles so you can re-create it without the need for step-by-step instructions.

...
Pattern Calculus: Computing with Functions and Structures
Pattern Calculus: Computing with Functions and Structures

The pattern calculus is a new foundation for computation, in which the expressive power of functions and of data structures are combined within pattern-matching functions. The best existing foundations focus on either functions, as in the lambda-calculus, or on data structures, as in Turing machines, or on compromises involving both, as in...

unlimited object storage image
Result Page: 73 72 71 70 69 68 67 66 65 64 63 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy