Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mac X OS Headaches: How to Fix common (and Not So Common) Problems in a Hurry
Mac X OS Headaches: How to Fix common (and Not So Common) Problems in a Hurry

Fast, Effective Relief from Mac OS X Troubles

Diagnose and cure problems for Mac OS X and OS X 10.2 Jaguar

Seeking relief from mouse mishaps or memory malfunctions? Take the cure and achieve peak performance with Mac OS X and OS X 10.2 Jaguar. In this valuable resource, Mac guru and best-selling author Curt Simmons covers...

XML Web Services in the Organization
XML Web Services in the Organization

Discover how you can use XML-based Web services to dramatically improve the data sharing and communication capabilities in your organization. This pragmatic guide teaches you how to exploit the interoperability features of the Microsoft .NET Framework to build highly available, platform-independent Web services. Easy-to-follow sample...

OCA/OCP: Oracle9i DBA Fundamentals I Study Guide
OCA/OCP: Oracle9i DBA Fundamentals I Study Guide
Here's the book you need to prepare for Exam 1Z0-031: OCA/OCP: Oracle9i DBA Fundamentals I Study Guide
  • In-depth coverage of official exam objectives
  • Practical information on implementing and managing Oracle9i databases
  • Hundreds of challenging review questions, in the book and on...
Windows 2000: Quick Fixes
Windows 2000: Quick Fixes
O'Reilly and Associates is known mainly for publishing excellent books about programming languages and operating systems, and for catering to propellerheads' endless appetite for minor details. In Windows 2000 Quick Fixes, O'Reilly proves that it can put out equally excellent books for less technical users of operating systems--people...
Introducing Maven: A Build Tool for Today's Java Developers
Introducing Maven: A Build Tool for Today's Java Developers

Gain an understanding of Maven’s dependency management and use it to organize basic and multi-module Maven projects. This short book is your quick-start tutorial for learning to use Maven. It includes inconsistently immutable collections, better array construction, and more from the latest Maven version 3.6. This second edition...

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
Hacking the Code: ASP.NET Web Application Security
Hacking the Code: ASP.NET Web Application Security

This unique book walks you through the many threats to your web application code, from managing and authorizing users and encrypting private data to filtering user input and securing XML. For every defined threat, it provides a menu of solutions and coding considerations. And, it offers coding examples and a set of security policies for each of...

Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
PLAN, INSTALL, CONFIGURE, SECURE, OPTIMIZE AND TROUBLESHOOT! Citrix MetaFrame is the de facto standard for hosting and delivering applications from Windows-based servers. Citrix MetaFrame Presentation Server 3.0 is optimized for performance under Windows Server 2003, particularly Terminal Services. This book covers all the topics...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Windows 8 and Office 2013 For Dummies
Windows 8 and Office 2013 For Dummies

Learn to:

  • Navigate the Windows 8 Start screen
  • Create user accounts and set passwords
  • Use Word, Excel®, PowerPoint®, and Outlook®

Master the basics of

Windows 8 and Office 2013!

Windows and Office work together to turn your PC into a...

Pro Spring Security
Pro Spring Security

Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Pro Spring Security will be a reference and advanced tutorial
...

From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy