Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Life Cycle of Clusters in Designing Smart Specialization Policies (SpringerBriefs in Applied Sciences and Technology)
Life Cycle of Clusters in Designing Smart Specialization Policies (SpringerBriefs in Applied Sciences and Technology)
This book investigates cluster-life-cycle (CLC) analysis to inform the entrepreneurial discovery process (EDP), in order to support the effectiveness of the smart specialization strategy (S3). It focuses on the evolutionary analysis of clusters’ development stages (emergence, development, maturity, decline/transformation), highlighting how...
Introducing Maven: A Build Tool for Today's Java Developers
Introducing Maven: A Build Tool for Today's Java Developers

Gain an understanding of Maven’s dependency management and use it to organize basic and multi-module Maven projects. This short book is your quick-start tutorial for learning to use Maven. It includes inconsistently immutable collections, better array construction, and more from the latest Maven version 3.6. This second edition...

Android Application Development with Maven
Android Application Development with Maven

Learn how to use and configure Maven to support all phases of the development of an Android application

About This Book

  • Learn how to effectively use Maven to create, test, and release Android applications
  • Customize Maven using a variety of suggested plugins for the most popular Android...
xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
Automated testing is a cornerstone of agile development. An effective testing strategy will deliver new functionality more aggressively, accelerate user feedback, and improve quality. However, for many developers, creating effective automated tests is a unique and unfamiliar challenge.

xUnit Test Patterns is the...

Cubism (Art of Century)
Cubism (Art of Century)

Les Demoiselles d’Avignon: five young women that changed modern art forever. Faces seen simultaneously from the front and in profile, angular bodies whose once voluptuous feminine forms disappear behind asymmetric lines-with this painting, Picasso revolutionised the entire history of painting. Cubism was thus born in 1907....

Advances in Fuzzy Clustering and its Applications
Advances in Fuzzy Clustering and its Applications

A comprehensive, coherent, and in depth presentation of the state of the art in fuzzy clustering.

Fuzzy clustering is now a mature and vibrant area of research with highly innovative advanced applications. Encapsulating this through presenting a careful selection of research contributions, this book...

Trustworthy Compilers (Quantitative Software Engineering Series)
Trustworthy Compilers (Quantitative Software Engineering Series)

The Most Complete, Real-World Guide to Compiler

Development—and the Principles of Trustworthy Compilers

Drawing on the author's over thirty years of expertise in compiler development, research, and instruction, Trustworthy Compilers introduces and analyzes the concept of trustworthy compilers and the principles...

Oracle ADF Enterprise Application Development – Made Simple: Second Edition
Oracle ADF Enterprise Application Development – Made Simple: Second Edition

The simplest way to learn Oracle's ADF is to follow an enterprise development process from start to finish, which is exactly what this book does. Combining theory with real-world examples, it's the ultimate guide for Oracle and J2EE developers.

Overview

  • Utilize best practices for real-life...
Disruption by Design: How to Create Products that Disrupt and then Dominate Markets
Disruption by Design: How to Create Products that Disrupt and then Dominate Markets

From Eli Whitney to Henry Ford to Ray Kroc to Steve Jobs, market disruptors have reaped the benefits, including fame and fortune. But do you have to be that rare genius whose unique skills can literally change the world? No. Disrupting a market is a discipline that can be learned. Disruption by Design—a handbook for...

Acoustic Diffusers and Absorbers: Theory, Design and Application
Acoustic Diffusers and Absorbers: Theory, Design and Application
Every book tells a story and there is a story behind every book. This story begins in 1980, in the conference room of the laboratory for the structure of matter at the Naval Research Laboratory (NRL) in Washington, DC, where Peter D’Antonio was employed as a diffraction physicist. Knowing Peter’s interest in music, a colleague handed...
Beginning Software Engineering
Beginning Software Engineering

A complete introduction to building robust and reliable software

Beginning Software Engineering demystifies the software engineering methodologies and techniques that professional developers use to design and build robust, efficient, and consistently reliable software. Free of jargon and assuming no previous
...

Result Page: 23 22 21 20 19 18 17 16 15 14 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy