Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Design Thinking Playbook: Mindful Digital Transformation of Teams, Products, Services, Businesses and Ecosystems
The Design Thinking Playbook: Mindful Digital Transformation of Teams, Products, Services, Businesses and Ecosystems

A radical shift in perspective to transform your organization to become more innovative

The Design Thinking Playbook is an actionable guide to the future of business. By stepping back and questioning the current mindset, the faults of the status quo stand out in stark relief—and this guide gives you the tools...

Learning Agile: Understanding Scrum, XP, Lean, and Kanban
Learning Agile: Understanding Scrum, XP, Lean, and Kanban
Learning Agile is a comprehensive guide to the most popular agile methods, written in a light and engaging style that makes it easy for you to learn.

Agile has revolutionized the way teams approach software development, but with dozens of agile methodologies to choose from, the decision to "go agile"
...
The Agile Enterprise: Building and Running Agile Organizations
The Agile Enterprise: Building and Running Agile Organizations

Discover how to implement and operate in an Agile manner at every level of your enterprise and at every point from idea to delivery. Learn how Agile-mature organizations adapt nimbly to microchanges in market conditions. Learn cutting-edge practices and concepts as you extend your implementation of Agile through the entire enterprise to meet...

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...

Mobile Forensics: Advanced Investigative Strategies
Mobile Forensics: Advanced Investigative Strategies

Key Features

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career...
The Lean Mindset: Ask the Right Questions
The Lean Mindset: Ask the Right Questions

What company doesn’t want energized workers, delighted customers, genuine efficiency, and breakthrough innovation? The Lean Mindset shows how lean companies really work–and how a lean mindset is the key to creating stunning products and delivering amazing services.

Through...

Object Thinking
Object Thinking

In Object Thinking, esteemed object technologist David West contends that the mindset makes the programmer—not the tools and techniques. Delving into the history, philosophy, and even politics of object-oriented programming. West reveals how the best programmers rely on analysis and conceptualization—on...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Learning Perforce SCM
Learning Perforce SCM

A comprehensive guide to the world's leading enterprise configuration management system

Overview

  • Master the use of P4V - the Perforce Visual Client
  • Get into the Perforce mindset for seamless use in your daily work
  • Grasp key concepts and learn how to apply them for proper...
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
PHP Team Development
PHP Team Development
Given the nature of the business environment today, organizations that want to build value-added enterprise PHP applications need a team of PHP people rather than an individual. You've got a team! What next? Customizing such applications to meet with organizational objectives and maintaining these applications over time can be quite a tedious task...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy