Home | Amazing | Today | Tags | Publishers | Years | Search 
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

I suppose there are several questions that may be running through your head as you contemplate reading this book: Who is the intended audience for this book? How is this book different from book ‘x’ (insert your favorite title here)? Why should I buy it? Because these are all fair questions and I am asking you to plunk...

Data Mining: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)
Data Mining: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)

We are deluged by data—scientific data, medical data, demographic data, financial data, and marketing data. People have no time to look at this data. Human attention has become a precious resource. So, we must find ways to automatically analyze the data, to automatically classify it, to automatically summarize it, to...

Wizards and Warriors: Massively Multiplayer Online Game Creation
Wizards and Warriors: Massively Multiplayer Online Game Creation

Welcome to the book Wizards and Warriors. This book is aimed at anyone who wishes to make an MMO (Massively Multiplayer Online) game. This book will show you what anMMOis comprised of, how to design your game ideas, and give you an extensive tour of an MMO creation package called Realm Crafter.

By the end of the book,...

Beginning C# Object-Oriented Programming
Beginning C# Object-Oriented Programming

It has been my experience as a .Net trainer and lead programmer that most people do not have trouble picking up the syntax of the language. What perplexes and frustrates many people are the higher-level concepts of object-oriented programming methodology and design. To compound the problem, most introductory programming books and...

Project Management for Information Systems (5th Edition)
Project Management for Information Systems (5th Edition)

We are very pleased to present this fifth edition of Project Management for Information Systems. As with its predecessors, our ‘target audience’ fall into four groups:

  • IS project managers and systems developers who find themselves responsible for managing systems projects. Newcomers to this activity will find...
Using LinkedIn
Using LinkedIn

Although professionals have always acknowledged the value of networking, today’s economic climate makes developing a solid network even more critical. LinkedIn, the leading social networking site for professionals, is the ideal tool for maximizing the potential of an online network. LinkedIn currently has more than 65 million...

Beginning SharePoint 2010 Administration: Windows SharePoint Foundation 2010 and Microsoft SharePoint Server 2010
Beginning SharePoint 2010 Administration: Windows SharePoint Foundation 2010 and Microsoft SharePoint Server 2010

BECAUSE YOU ARE READING THIS, I assume that you share my interest for Microsoft SharePoint. In my case it is more than an interest, it is a passion! For more than 30 years, I have been working with computers, from assembler programming to complex software solutions. For more than 10 years my whole world was e - mail (my personal car...

LR Parsing: Theory and Practice (Cambridge Studies in Cultural Systems)
LR Parsing: Theory and Practice (Cambridge Studies in Cultural Systems)

LR parsing has become a widely used method of syntax analysis; this is largely due to the availability of parser generators and compiler- compilers based on LR techniques. However, the readily available ac counts of the theory of these techniques are either superficial or are weighed down with tedious mathematical detail of a merely...

PIC Microcontroller Project Book
PIC Microcontroller Project Book

I know you are interested in programming and using PIC microcontrollers. If not, you would not have picked up this book and be reading this preface. The first question one usually asks when choosing one book over another is, "Which book offers me something more?" Since everyone is looking for some thing a little different in...

Ethics in Information Technology
Ethics in Information Technology

We are excited to publish the third edition of Ethics in Information Technology. This new edition builds on the success of the previous editions and meets the need for a resource that helps readers understand many of the legal, ethical, and societal issues associated with IT. We have responded to the feedback from our first and second...

Any Time, Anywhere Computing: Mobile Computing Concepts and Technology
Any Time, Anywhere Computing: Mobile Computing Concepts and Technology

Mobile communications have permeated the globe in both business and social cultures. In only a few short years, Japan alone has had more than ten million subscribers enter the mobile market. Such explosive popularity is an indication of a strong commercial demand for communications in both the tethered and tetherless environments.

...
Sams Teach Yourself the Twitter API in 24 Hours (Sams Teach Yourself -- Hours)
Sams Teach Yourself the Twitter API in 24 Hours (Sams Teach Yourself -- Hours)

This book on the Twitter API is geared to the programmer who is just a bit past beginner—who knows the basics of LAMP, including how to set up a basic server, PHP, JavaScript, HTML, and CSS. You do not have to be an expert programmer to use this book, but you should know how to look things up. In writing this book, we have tried...

Result Page: 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy