Home | Amazing | Today | Tags | Publishers | Years | Search 
Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
What's New About Crop Plants: Novel Discoveries of the 21st Century
What's New About Crop Plants: Novel Discoveries of the 21st Century

Until recently, breeding efforts in mass produced food crops centered on high yield production, yet sacrificed flavor, taste, and other qualities. Now, more emphasis is being placed on the enhancement of nutritional and medicinal properties as well as from an environmental impact and sustainability standpoint. This volume looks at the use of...

Physics for JavaScript Games, Animation, and Simulations: with HTML5 Canvas
Physics for JavaScript Games, Animation, and Simulations: with HTML5 Canvas

Have you ever wanted to include believable physical behaviors in your games and projects to give them that extra edge? Physics for JavaScript Games, Animation, and Simulations teaches you how to incorporate real physics, such as gravity, friction, and buoyancy, into your HTML5 games, animations, and simulations. It also includes more...

Stem Cell Biology and Regenerative Medicine in Ophthalmology
Stem Cell Biology and Regenerative Medicine in Ophthalmology
In the last few decades, stem cell research has developed groundbreaking technologies to both study and treat diseases. This research has proven fruitful for the field of ophthalmology, especially in recent years. With its relative immune privilege, the eye has proven an ideal testing ground for stem cell therapies.

...
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Modeling and Convexity (Iste)
Modeling and Convexity (Iste)

This reference book gives the reader a complete but comprehensive presentation of the foundations of convex analysis and presents applications to significant situations in engineering. The presentation of the theory is self-contained and the proof of all the essential results is given. The examples consider meaningful situations such as the...

Social Media Mining with R
Social Media Mining with R

There’s probably no better place to gain behavioral insights than through social media, but analyzing the mass of data is often difficult. With this book you’ll learn to employ the latest techniques and processes using R.

Overview

  • Learn how to face the challenges of analyzing social media...
Getting Started with Dwarf Fortress: Learn to play the most complex video game ever made
Getting Started with Dwarf Fortress: Learn to play the most complex video game ever made

Dwarf Fortress may be the most complex video game ever made, but all that detail makes for fascinating game play, as various elements collide in interesting and challenging ways. The trick is getting started. In this guide, Fortress geek Peter Tyson takes you through the basics of this menacing realm, and helps you overcome the...

REST API Design Rulebook
REST API Design Rulebook

In today’s market, where rival web services compete for attention, a well-designed REST API is a must-have feature. This concise book presents a set of API design rules, drawn primarily from best practices that stick close to the Web’s REST architectural style. Along with rules for URI design and HTTP use, you’ll...

Mac OS X Pocket Reference: A User's Guide to Mac OS X
Mac OS X Pocket Reference: A User's Guide to Mac OS X

Apple's new operating system, Mac OS X, is reaching a critical mass. Its sleek Aqua interface, combined with a powerful BSD Unix core, bring usability and stability to a new level. As companies start to migrate to Mac OS X from earlier versions of the Mac OS and from other flavors of Unix, IT managers are looking for a quick...

The Customer Trap: How to Avoid the Biggest Mistake in Business
The Customer Trap: How to Avoid the Biggest Mistake in Business

American business is dysfunctional. Companies of all sizes follow the mistaken belief that their products and services are best sold through organizations with pervasive market reach. Far too many business leaders fail to realize - until it is too late - that the relentless pursuit of volume at all cost is not the key to long-term profits and...

Exploring C++ 11 (Expert's Voice in C++)
Exploring C++ 11 (Expert's Voice in C++)

Exploring C++ divides C++ up into bite-sized chunks that will help you learn the language one step at a time. Assuming no familiarity with C++, or any other C-based language, you’ll be taught everything you need to know in a logical progression of small lessons that you can work through as quickly or as slowly as you need.

...
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy