Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

...

OpenGL Graphics Through Applications
OpenGL Graphics Through Applications
This book is the result of teaching computer graphics for one and two semester, year two/three undergraduate and postgraduate lecture courses in Computer Graphics. Throughout the book, theory is followed by implementation using C/C++ and complete programs are provided with suggestions for change to enhance student understanding. During 30 years of...
Microsoft SQL Server 2014 Business Intelligence Development Beginners Guide
Microsoft SQL Server 2014 Business Intelligence Development Beginners Guide

Get to grips with Microsoft Business Intelligence and data warehousing technologies using this practi cal guide

About This Book

  • Discover the Dimensional Modeling concept while designing a data warehouse
  • Learn Data Movement based on technologies such as SSIS, MDS, and DQS
  • ...
XML for Data Architects: Designing for Reuse and Integration
XML for Data Architects: Designing for Reuse and Integration

XML is a tremendous enabler for platform agnostic data and metadata exchanges. However, there are no clear processes and techniques specifically focused on the engineering of XML structures to support reuse and integration simplicity, which are of particular importance in the age of application integration and Web services. This book describes...

Fraud Exposed: What You Don't Know Could Cost Your Company Millions
Fraud Exposed: What You Don't Know Could Cost Your Company Millions
The $600 billion gorilla in the room

"Dr. Joe Koletar has provided an effective road map to the problem of occupational fraud, in both the public and private sectors, in America. Such frauds affect every American worker, shareholder, and taxpayer. His insights and ideas are an important contribution to the effort to fight this growing...

Ruby Data Processing: Using Map, Reduce, and Select
Ruby Data Processing: Using Map, Reduce, and Select
Gain the basics of Ruby’s map, reduce, and select functions and discover how to use them to solve data-processing problems. This compact hands-on book explains how you can encode certain complex programs in 10 lines of Ruby code, an astonishingly small number. You will walk through problems and solutions which are effective...
Frontiers of Geographic Information Technology
Frontiers of Geographic Information Technology
Although designed primarily for desktop mapping and analysis, Geographic Information Systems have, for some years, been ‘coupled’ to other ‘allied’ technologies. This coupling or integration has occurred for some time due to the limitations in commercially available systems. It has occurred in several areas including...
Fast Data Processing with Spark (Community Experience Distilled)
Fast Data Processing with Spark (Community Experience Distilled)

High-speed distributed computing made easy with Spark

Overview

  • Implement Spark's interactive shell to prototype distributed applications
  • Deploy Spark jobs to various clusters such as Mesos, EC2, Chef, YARN, EMR, and so on
  • Use Shark's SQL query-like syntax with...
Hidden Treasures in Contemporary RNA Sequencing (SpringerBriefs in Computer Science)
Hidden Treasures in Contemporary RNA Sequencing (SpringerBriefs in Computer Science)
Advances in RNA-sequencing (RNA-seq) technologies have provided an unprecedented opportunity to explore the gene expression landscape across individuals, tissues, and environments by efficiently profiling the RNA sequences present in the samples. When a reference genome sequence or a transcriptome of the sample is available,...
Constructing Measures: An Item Response Modeling Approach
Constructing Measures: An Item Response Modeling Approach
Constructing Measures introduces a way to understand the advantages and disadvantages of measurement instruments, how to use such instruments, and how to apply these methods to develop new instruments or adapt old ones. The book is organized around the steps taken while constructing an instrument. It opens with a summary of the...
Unreal Tournament Game Programming for Teens
Unreal Tournament Game Programming for Teens
This book centers on programming.All of the program examples involve the actions within a map (or level), so you can readily expand on the programs you create during the course of this book to modify the game. This book focuses on the creation of programs using UnrealScript. The programs are often made fairly long and involved so that you have a...
Frommer's Seattle 2010 (Frommer's Complete Guides)
Frommer's Seattle 2010 (Frommer's Complete Guides)
  • Completely updated every year, Frommer's Seattle features 16 pages of gorgeous color photos of the sights and experiences that await you.
  • Our expert author has combed the city looking for the best hotels, restaurants, shops, and nightlife spots, and has created detailed walking tours to take you through some...
unlimited object storage image
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy