Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Deploying Node.js
Deploying Node.js

Learn how to build, test, deploy, monitor, and maintain your Node.js applications at scale

About This Book

  • Gain comprehensive information on scaling Node.js both vertically and horizontally in the cloud and across virtual machines
  • Learn how to use Gulp, Mocha, Chai, PhantomJS, Git,...
Mastering VBA for Office 2010
Mastering VBA for Office 2010

Visual Basic for Applications (VBA) is a powerful tool that enables you to automate operations in the Microsoft Offi ce applications and in other applications that host VBA. By automating operations using VBA, you can save yourself and your colleagues huge amounts of time and effort. Getting more work done in less time is usually good...

Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic...
Expert One-on-One Oracle
Expert One-on-One Oracle
Tom Kyte is of a rare breed. To begin, he's technically expert in his subject (administration of and development of applications for Oracle database management systems). What's more (and what distinguishes him from the ranks of the super-competent), he is both able and willing to share his considerable store of wisdom with Oracle users via...
HTML5 & CSS3 For The Real World
HTML5 & CSS3 For The Real World

HTML5 and CSS3 for the Real World is your perfect introduction to the latest generation of web technologies. This easy-to-follow guide covers everything you need to know to get started today. You'll master the semantic markup available in HTML5, as well as how to use CSS3 to create amazing-looking websites without...

Professional C# 4.0 and .NET 4 (Wrox Programmer to Programmer)
Professional C# 4.0 and .NET 4 (Wrox Programmer to Programmer)

This book starts by reviewing the overall architecture of .NET in order to give you the background you need to be able to write managed code. After that, the book is divided into a number of sections that cover both the C# language and its application in a variety of areas.

Part I: The C# Language: This section gives a good...

Our Beautiful, Fragile World: The Nature and Environmental Photographs of Peter Essick
Our Beautiful, Fragile World: The Nature and Environmental Photographs of Peter Essick

Our Beautiful, Fragile World features a career-spanning look at the images of photojournalist Peter Essick taken while on assignment for National Geographic magazine. In this book, Essick showcases a diverse series of photographs from some of the most beautiful natural areas in the world and documents major contemporary...

Using Samba
Using Samba
Samba, the Server Message Block (SMB) server software that makes it relatively easy to integrate Unix or Linux servers into networks of Microsoft Windows workstations, has to date been mostly explained as an afterthought. Most often, it's appeared in the latter chapters of books about Linux. It deserves better, and the authors of Using...
ITIL Service Strategy 2011 Edition
ITIL Service Strategy 2011 Edition

The ITIL 2011 Editions have been updated for clarity, consistency, correctness and completeness. ITIL Service Strategy provides a view of ITIL that aligns business and IT so that each brings out the best in the other. It ensures that every stage of the service lifecycle stays focused on the business case and relates to all the companion...

Think Yourself Successful: Rewire Your Mind, Become Confident, and Achieve Your Goals
Think Yourself Successful: Rewire Your Mind, Become Confident, and Achieve Your Goals

Dr. Alireza Azmandian was born in Tehran in 1953 and traveled to America in 1985, where he earned his master's degree in Engineering Management and his Ph.D. in Industrial and Systems Engineering from the University of Southern California. He returned to Iran in 1997 in order to pass on the invaluable achievements of the "technology...

Result Page: 49 48 47 46 45 44 43 42 41 40 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy