Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Visualization: Visualizing the Structure, Behaviour, and Evolution of Software
Software Visualization: Visualizing the Structure, Behaviour, and Evolution of Software
Software visualization encompasses the development and evaluation of methods for graphically representing different aspects of software, including its structure, its execution, and its evolution. Software visualization combines techniques from areas like software engineering, programming languages, data mining, computer graphics, information...
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects
...
Absolute Beginner's Guide to Microsoft Office OneNote 2003
Absolute Beginner's Guide to Microsoft Office OneNote 2003
Absolute Beginner's Guide to Microsoft Office OneNote 2003 is a from-scratch reference that helps you get up to speed quickly on this new note taking and management program. The book starts from square one, explaining what OneNote is and why you would want to buy it. The book continues to show you how to type in...
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

And Every Word Is True: Newfound evidence reveals Truman Capote's
And Every Word Is True: Newfound evidence reveals Truman Capote's
Truman Capote’s bestselling book “In Cold Blood” has captivated worldwide audiences for over fifty years. It is a gripping story about the consequences of a trivial robbery gone terribly wrong in a remote village of western Kansas.But what if robbery was not the motive at all, but something more sinister? And why would the...
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003
2600: The Hacker Quarterly, Spring 2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet
...
Penetration Testing with BackBox
Penetration Testing with BackBox

This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox.

Overview

  • Experience the real world of penetration testing with Backbox Linux using...
Illustrator CS for Dummies
Illustrator CS for Dummies

So you thought Illustrator should really be called “Intimidator?” Not so! Let this book draw you a map through the jungle of pages, paths, pixels, and Pen tools, and before you know it, you’ll have your creations in print, on the Web, or even on a PDA. Then, just smile mysteriously when folks say “Wow!”

...
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005
2600: The Hacker Quarterly, Spring 2005

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
...
Windows 7 Plain & Simple
Windows 7 Plain & Simple

If you want to get the most from your computer and your software with the least amount of time and effort—and who doesn’t?—this book is for you. You’ll fi nd Windows 7 Plain & Simple to be a straightforward, easy-to-read reference tool. With the premise that your computer should work for you, not you for...

Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

Linux Toys II: 9 Cool New Projects for Home, Office, and Entertainment (ExtremeTech)
Linux Toys II: 9 Cool New Projects for Home, Office, and Entertainment (ExtremeTech)
The Linux toyshop just added a new wing

Tired of playing with your old Linux toys? Wait 'til you see what Chris Negus has cooked up for you now! How about a Web-based Gallery server for sharing digital images over a network? A slick MythTV personal video recorder entertainment center? Automating gadgets and home lighting with X10? Or recycling...

unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy