Home | Amazing | Today | Tags | Publishers | Years | Search 
Python Descriptors: Understanding and Using the Descriptor Protocol
Python Descriptors: Understanding and Using the Descriptor Protocol
Create descriptors and see ideas and examples of how to use descriptors effectively. In this short book, you’ll explore descriptors in general, with a deep explanation of what descriptors are, how they work, and how they're used. Once you understand the simplicity of the descriptor protocol, the author delves into...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Pro Python 3: Features and Tools for Professional Development
Pro Python 3: Features and Tools for Professional Development

Refine your programming techniques and approaches to become a more productive and creative Python programmer. This book explores the concepts and features that will improve not only your code but also your understanding of the Python community with insights and details about the Python philosophy.

Pro Python 3,...

Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust...
Networking Fundamentals
Networking Fundamentals

A clear and concise resource on Windows networking, perfect for IT beginners

Did you know that nearly 85% of IT support roles require a good understanding of networking concepts? If you are looking to advance your IT career, you will need a foundational understanding of Windows networking. Network...

Oncolytic Viruses (Methods in Molecular Biology)
Oncolytic Viruses (Methods in Molecular Biology)
Anecdotal clinical reports of tumor remissions after viral infections laid the foundation for the field of oncolytic virotherapy. Advances in molecular virology, tumor biology, and immunology have enabled more refined studies of tumor-selective viruses. Concomitant with the resurgence of cancer immunotherapy and after...
Intraocular Tumors
Intraocular Tumors
This book aims to cover all aspects of intraocular tumors. The chapters explain diagnosis and treatment plan in detail with the aid of step-by-step descriptions in the form of flow charts. An additional chapter covers imaging modalities that help in diagnosing these conditions. The book is written by subject experts from all over the world....
Broadband Communications, Networks, and Systems: 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings ... and Telecommunications Engineering, 263)
Broadband Communications, Networks, and Systems: 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings ... and Telecommunications Engineering, 263)

This book constitutes the refereed post-conference proceedings of the 9th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2018,  which took place in Faro, Portugal, in September 2018.

The 30 revised full and 16 workshop papers were carefully reviewed and selected from 68
...
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Industrial Sensors and Controls in Communication Networks: From Wired Technologies to Cloud Computing and the Internet of Things (Computer Communications and Networks)
Industrial Sensors and Controls in Communication Networks: From Wired Technologies to Cloud Computing and the Internet of Things (Computer Communications and Networks)

This informative text/reference presents a detailed review of the state of the art in industrial sensor and control networks. The book examines a broad range of applications, along with their design objectives and technical challenges. The coverage includes fieldbus technologies, wireless communication technologies, network...

Evidence-Based Practice in Perioperative Cardiac Anesthesia and Surgery
Evidence-Based Practice in Perioperative Cardiac Anesthesia and Surgery

This comprehensive yet concise book addresses current best practice in the combined areas of cardiac surgery and anesthesia, interventional minimally invasive cardiac procedures, perioperative management and monitoring, and critical care recovery. This book not only provides the latest best practices in the perioperative management...

Handbook of Oil and Gas Piping: a Practical and Comprehensive Guide
Handbook of Oil and Gas Piping: a Practical and Comprehensive Guide

The objective of this practical oil and gas piping handbook is to facilitate project management teams of oil and gas piping related construction projects to understand the key requirements of the discipline and to equip them with the necessary knowledge and protocol. It provides a comprehensive coverage on all the practical aspects...

Result Page: 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy