 |
|
|
|
 |  |  |  |  Moodle 3 Administration - Third Edition
Key Features
-
Learn how to plan, install, optimize, customize, and configure Moodle
-
Guarantee a cutting-edge learning experience in a secure and customizable environment while optimizing your day-to-day workload
-
A one-stop guide with a problem-solution approach and a wide range of real-world
... |
|
 Secure System Design and Trustable Computing
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system... |  |  C# 6.0 in a Nutshell: The Definitive Reference
When you have questions about C# 6.0 or the .NET CLR and its core Framework assemblies, this bestselling guide has the answers you need. C# has become a language of unusual flexibility and breadth since its premiere in 2000, but this continual growth means there’s still much more to learn.
Organized around concepts... |  |  Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live... |
|
| Result Page: 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 |