Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

Test Driven: TDD and Acceptance TDD for Java Developers
Test Driven: TDD and Acceptance TDD for Java Developers

In test driven development, you first write an executable test of what your application code must do. Only then do you write the code itself and, with the test spurring you on, you improve your design. In acceptance test driven development (ATDD), you use the same technique to implement product features, benefiting from iterative development,...

REPOSITIONING:  Marketing in an Era of Competition, Change and Crisis
REPOSITIONING: Marketing in an Era of Competition, Change and Crisis

The book that completes Positioning . . .

Thirty years ago, Jack Trout and Al Ries published their classic bestseller, Positioning: The Battle for Your Mind—a book that revolutionized the world of marketing. But times have changed. Competition is fiercer. Consumers are savvier. Communications are...

The Complete Guide to Day Trading: A Practical Manual From a Professional Day Trading Coach
The Complete Guide to Day Trading: A Practical Manual From a Professional Day Trading Coach

Do you want to be a day trader?

Every day, millions of dollars change hands in the markets, presenting the perfect opportunity for people just like you to make significant money and profits through the art of day trading.

But here's the question: is day trading right for you? And, if it is, how do you get...

Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)
Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)
Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Fully updated for today's key threats, tools, and solutions, this book shows you how hackers...
Microsoft FrontPage Version 2002 Inside Out
Microsoft FrontPage Version 2002 Inside Out

The World Wide Web has become the predominant electronic publishing medium on the planet. Once considered an obscure technical resource, the Internet now receives prominent publicity at sporting events, in presidential debates, in television commercials, and in print advertising and marketing materials everywhere. Without the...

CIOs at Work
CIOs at Work

In CIOs at Work, noted author Ed Yourdon interviews many of the world's most influential chief information officers. You will gain insights from the first CIO of the USA, take a peek into the future with the CIO at Google, learn the unique role IT plays in testing Microsoft applications, and much more.

...

Neuro-Linguistic Programming Workbook For Dummies
Neuro-Linguistic Programming Workbook For Dummies

If you are one of the millions of people who have already discovered the power of NLP, Neuro-linguistic Programming Workbook For Dummies will allow you to perfect its lessons on how to think more positively and communicate more effectively with others.

This workbook is packed with hands-on exercises and practical...

Engineering Societies in the Agents World IV: 4th International Workshop, ESAW 2003, London, UK, October 29-31, 2003, Revised Selected and Invited Papers
Engineering Societies in the Agents World IV: 4th International Workshop, ESAW 2003, London, UK, October 29-31, 2003, Revised Selected and Invited Papers
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Engineering Societies in the Agents World, ESAW 2004, held in London, UK in October 2004. The 23 revised full papers presented were carefully selected during two rounds of reviewing and improvement for inclusion in the book; also included are 2...
Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development
Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development

With the advent of version 2 of the iPhone system, Apple proved they could do a remarkable thing — adapt their existing Cocoa computer application programming framework to make applications for a touch-based device with limited memory and speed and a dauntingly tiny display. The resulting Cocoa Touch framework, in fact, turned...

Rethink: A Business Manifesto for Cutting Costs and Boosting Innovation
Rethink: A Business Manifesto for Cutting Costs and Boosting Innovation

It's the trap that ensnares virtually every business. We focus on process: "how" we're doing the job. And we forget about the bigger issue: "what" we're doing and "why" we're doing it. That's why we're leaving so much value on the table. In Rethink, business architect Ric Merrifield...

Games Diversions & Perl Culture: Best of the Perl Journal
Games Diversions & Perl Culture: Best of the Perl Journal

This is the third of three “Best of The Perl Journal” O’Reilly books, containing the créme de la créme of the 247 articles published during The Perl Journal ’s five-year existence as a standalone magazine. This particular book contains 47 articles about the leisure pursuits of Perl programmers....

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy