Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X

Explore a ton of powerful Mac OS X UNIX commands

This handy, compact guide teaches you to use Mac OS X UNIX systems as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Apply the skills you learn from this book to...

How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

Telecommunications and Networks (Computer Weekly)
Telecommunications and Networks (Computer Weekly)
Telecommunications is an old and stable technology if you think only of telephones and telegraph. But in the 1960s came computers and the processing of data. Soon, we needed data communications to transmit data to remote PCs connected by networks. Later, these points of communications increased in number, with the transmission being no longer...
Programming Web Services with Perl
Programming Web Services with Perl
Programming Web Services with Perl is written for Perl programmers who have no prior knowledge of web services. No understanding of XML-RPC or SOAP is necessary to be able to apply these technologies easily, through the use of publicly available Perl modules detailed in the book. If you're interested in applying...
Degunking Microsoft Office
Degunking Microsoft Office
Degunking Microsoft Office covers the basics to help you quickly get your PCs back to top performance. The unique thing about Degunking Microsoft Office is that it's organized according to the special "cleaning" process that will improve the performance of your computer. Shortcut and time calculation charts are provided...
Selenium 1.0 Testing Tools: Beginners Guide
Selenium 1.0 Testing Tools: Beginners Guide

The Selenium 1.0 Testing Tools Beginner's guide shows developers and testers how to create automated tests using a browser. You'll be able to create tests using Selenium IDE, Selenium Remote Control and Selenium 2 as well. A chapter is completely dedicated to Selenium 2. We will then see how our tests use element locators such as CSS,...

Maximizing ASP.NET Real World, Object-Oriented Development
Maximizing ASP.NET Real World, Object-Oriented Development

Using ASP.NET, you can build Web applications that deliver unprecedented power and performance. But to make the most of ASP.NET, Web developers need to think and work very differently from the ways they've programmed in the past. In Maximizing ASP.NET Jeffrey Putz helps you make the transitionand reap the rewards.

...
Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Remote Sensing: The Image Chain Approach
Remote Sensing: The Image Chain Approach
Remote Sensing deals with the fundamental ideas underlying the rapidly growing field of remote sensing. John Schott explores energy-matter interaction, radiation propagation, data dissemination, and described the tools and procedures required to extract information from remotely sensed data using the image chain approach. Organizations and...
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists
Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists

Bring your electronic inventions to life!

"This full-color book is impressive...there are some really fun projects!" -GeekDad, Wired.com

Who needs an electrical engineering degree? This intuitive guide shows how to wire, disassemble, tweak, and re-purpose everyday devices quickly and easily. Packed with...

Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy