Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Mathematica by Example
Mathematica by Example
Mathematica bv Example is intended to bridge the gap which has existed between the very elementary handbooks available on Mathematica and those reference books written for the more advanced Mathematica users. This book is an extension of a manuscript which was developed to quickly introduce enough Mathematica commands to a group of...
Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Learn Ionic 2: Develop Multi-platform Mobile Apps
Learn Ionic 2: Develop Multi-platform Mobile Apps

Explore key scenarios required for building quality Ionic apps quickly and easily and bring them to the iOS and Android mobile ecosystem.

Learn Ionic 2 explains various techniques to quickly integrate third-party back end systems. With this short guide, you'll benefit from practical examples of...

Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Mastering Bitcoin: Unlocking Digital Cryptocurrencies

Mastering Bitcoin is essential reading for everyone interested in learning about bitcoin basics, the technical operation of bitcoin, or if you're building the next great bitcoin killer app or business. From using a bitcoin wallet to buy a cup of coffee, to running a bitcoin marketplace with hundreds of thousands of transactions, or...

The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
Even if the NFC standard is young (developed in 2004), I have been asked to write this book for several years now, due to the pioneering role played in France (and in Europe) by our Computer Science Master’s degree MBDS (www.mbds-fr.org) at the University of Nice – Sophia-Antipolis around the prototyping of innovative...
Everyday Cryptography: Fundamental Principles and Applications
Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the...

Managing Derivatives Contracts: A Guide to Derivatives Market Structure, Contract Life Cycle, Operations, and Systems
Managing Derivatives Contracts: A Guide to Derivatives Market Structure, Contract Life Cycle, Operations, and Systems

"I am sure practitioners, auditors, and regulators will find the content of Mr Shaik's book of value. The accessible style is also welcome. All in all, a worthwhile addition to the finance literature and one that hopefully helps plug the knowledge gap in this field." — from the foreword by Professor Moorad Choudhry, Brunel...

Web Hacking: Attacks and Defense
Web Hacking: Attacks and Defense

"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems...

Magento Mobile How-To
Magento Mobile How-To

Create and configure your own Magento Mobile application and publish it for the Android and iOS platforms

Overview

  • Style and theme your Magento Mobile Application interface
  • Configure Product categories and add static content for mobile
  • Prepare and publish your Magento mobile...
Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Building on the success of its storefront and fulfillment services, Amazon now allows businesses to "rent" computing power, data storage and bandwidth on its vast network platform. This book demonstrates how developers working with small- to mid-sized companies can take advantage of Amazon Web Services (AWS) such as the Simple Storage...
How to Buy a House with No (or Little) Money Down, 3rd Edition
How to Buy a House with No (or Little) Money Down, 3rd Edition
The Ultimate guide to finding and financing a home

Almost everyone aspires to owning a home, but the reality of coming up with a large enough down payment often stands in the way of making that dream come true. No longer! How to Buy a House with No (or Little) Money Down has helped tens of thousands become homeowners, and now it's your turn!...

Result Page: 12 11 10 9 8 7 6 5 4 3 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy