Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
T-SQL in One Hour a Day, Sams Teach Yourself
T-SQL in One Hour a Day, Sams Teach Yourself
Many excellent books about T-SQL are available, so how is this one different? In talking to the many people I meet in my travels around the country, I have heard one common complaint. Instead of the host of wonderful books available to expert database administrators (DBAs), most SQL Server readers yearn for a book targeted toward the...
Programming the Raspberry Pi, Second Edition: Getting Started with Python
Programming the Raspberry Pi, Second Edition: Getting Started with Python

An updated guide to programming your own Raspberry Pi projects

Learn to create inventive programs and fun games on your powerful Raspberry Pi―with no programming experience required. This practical book has been revised to fully cover the new Raspberry Pi 2, including upgrades to the Raspbian operating system. Discover...
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Exploring C for Microcontrollers: A Hands on Approach
Exploring C for Microcontrollers: A Hands on Approach
The market is flooded with numbers of good books on Embedded Systems designed especially with the most popular MCS51 family. These books are traditional in nature i.e. they start with the routine architectural features of 8051, description of registers, ports, interrupts etc. Most of these things are already covered in the device data sheet and...
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
Control of Interactive Robotic Interfaces: A Port-Hamiltonian Approach (Springer Tracts in Advanced Robotics, no. 29)
Control of Interactive Robotic Interfaces: A Port-Hamiltonian Approach (Springer Tracts in Advanced Robotics, no. 29)
From the reviews:

"This book deals with the important problem of modeling and controlling the interaction between two physical systems—from one side the robot and from the other side its environment. … It is a suitable tool to formally model physical systems based on the energy concept and its relations. The authors introduce...

Tkinter GUI Application Development Blueprints
Tkinter GUI Application Development Blueprints

Master GUI programming in Tkinter as you design, implement, and deliver ten real-world applications from start to finish

About This Book

  • Conceptualize and build state-of-art GUI applications with Tkinter
  • Tackle the complexity of just about any size GUI application with a structured and...
Nginx HTTP Server - Second Edition
Nginx HTTP Server - Second Edition

Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and fast transfer rates have become a necessity. This free, open source solution will either come as a full replacement of other software such as Apache,...

Kali Linux Network Scanning Cookbook
Kali Linux Network Scanning Cookbook

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali...
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Result Page: 17 16 15 14 13 12 11 10 9 8 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy