Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)

This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer networks that encompasses agile mobile systems...

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

Android Application Development for Java Programmers
Android Application Development for Java Programmers

We are witnessing an explosion in the use of handheld mobile devices worldwide. Recent polls have shown that many people own and use more than one mobile device, and some use as many as three or four. Smart phones, tablets, and handheld game devices are ubiquitous. The Android operating system (OS)--an open-source OS with Linux at its...

Multilinear Subspace Learning: Dimensionality Reduction of Multidimensional Data
Multilinear Subspace Learning: Dimensionality Reduction of Multidimensional Data

Due to advances in sensor, storage, and networking technologies, data is being generated on a daily basis at an ever-increasing pace in a wide range of applications, including cloud computing, mobile Internet, and medical imaging. This large multidimensional data requires more efficient dimensionality reduction schemes than the traditional...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Mastering Adobe Captivate 7
Mastering Adobe Captivate 7

Bring a new level of interactivity and sophistication to your e-learning content with the user-friendly features of Adobe Captivate. This practical tutorial will teach you everything from automatic recording to advanced tips and tricks.

Overview

  • Enhance your projects by adding interactivity, animations,...
Pro ASP.NET MVC 4
Pro ASP.NET MVC 4

The ASP.NET MVC 4 Framework is the latest evolution of Microsoft’s ASP.NET web platform. It provides a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility, combined with all the benefits of ASP.NET.

ASP.NET MVC 4 contains a number of significant...

Practical Web Development
Practical Web Development

Learn CSS, JavaScript, PHP, and more with this vital guide to modern web development

About This Book

  • Explore how the web is built from its foundations – learn everything from basic HTML through to JavaScript, PHP and beyond
  • Discover the latest trends in modern web development and...
React Router Quick Start Guide: Routing in React applications made easy
React Router Quick Start Guide: Routing in React applications made easy

Learn how you can implement routing in a React Web/Native application using React-Router library

Key Features

  • Create nested routes and complex workflows for your applications
  • Learn Routing in server-side rendered applications and in Native mobile applications
  • ...
Robot Programmer's Bonanza
Robot Programmer's Bonanza
The first hands-on programming guide for today's robot hobbyist

Get ready to reach into your programming toolbox and control a robot like never before! Robot Programmer's Bonanza is the one-stop guide for everyone from robot novices to advanced hobbyists who are ready to go beyond just building robots and start...

BlackBerry Enterprise Server 5 Implementation Guide
BlackBerry Enterprise Server 5 Implementation Guide

BlackBerry Enterprise Server is a platform that extends corporate messaging and collaboration services to BlackBerry devices. It supports management and administration of devices, and also supports deployment of third-party applications on the BlackBerry device platform. The basics of installing BlackBerry Enterprise Server are familiar for...

iOS Hacker's Handbook
iOS Hacker's Handbook

Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS...

unlimited object storage image
Result Page: 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy