PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.
You will learn how to join PowerShell's robust set of commands and access to the...
Everyday Data Structures
A practical guide to learning data structures simply and easily
About This Book
This book is a very practical, friendly, and useful guide that will help you analyze problems and choose the right data structures for your solution
Learn to recognize data patterns for determining which...
Learn Java for Web Development: Modern Java Web Development
Web development is still one of today's most popular, active, and important programming and development activities. From a single web page to an e-commerce-enabled web site to a fully-fledged web application, the Java programming language and its frameworks allow you great...
Programming C# C# is designed from the ground up for development on Microsoft's new .NET framework. As such, it's a high-performance language that's simple, safe, object-oriented, and Internet-centric. Programming C# teaches this new language in a way that experienced programmers will appreciate--by grounding its applications firmly in the context of... Fundamental Nursing Skills
Providing forward-thinking approaches and ideas for nurses of all categories, this reference has been written primarily in response to increasing concerns regarding the perceived lack of ability in both students and newly qualified nurses to perform clinical skills.
By outlining the elements of essential nursing procedure in a...
Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...
|Result Page: 80 79 78 77 76 75 74 73 72 71 |