Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll...
Practical Data Science Cookbook - Second Edition
Practical Data Science Cookbook - Second Edition

Over 85 recipes to help you complete real-world data science projects in R and Python

About This Book

  • Tackle every step in the data science pipeline and use it to acquire, clean, analyze, and visualize your data
  • Get beyond the theory and implement real-world projects in data science using...
Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka
Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka

Learn how to integrate full-stack open source big data architecture and to choose the correct technology―Scala/Spark, Mesos, Akka, Cassandra, and Kafka―in every layer. 

Big data architecture is becoming a requirement for many different enterprises. So far, however, the focus has largely been on collecting,...

Reporting with Visual Studio and Crystal Reports
Reporting with Visual Studio and Crystal Reports

Create a reporting application from scratch using Visual Studio and Crystal Reports

Overview

  • A step-by-step guide that goes beyond theory, letting you get hand-on experience
  • Utilize a dataset and table adapter as data sources for your report
  • Learn how to add reports to forms...
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems
Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems
Shell scripts are an efficient way to interact with your machine and manage your files and system operations. With just a few lines of code, your computer will do exactly what you want it to do. But you can also use shell scripts for many other essential (and not-so-essential) tasks.

This second edition of Wicked Cool
...
Learning SQL Server Reporting Services 2012
Learning SQL Server Reporting Services 2012

For a newcomer to SQL Reporting Services 2012, things can seem a bit daunting, but this book will ease your path to becoming an expert. Clear instructions and screenshots will have you generating reports in no time.

Overview

  • Build applications using the latest Microsoft technologies: SSIS 2012, SSDT, WPF,...
Excel 2016 VBA and Macros (includes Content Update Program) (MrExcel Library)
Excel 2016 VBA and Macros (includes Content Update Program) (MrExcel Library)

MASTER CORE EXCEL 2016 TOOLS FOR BUILDING POWERFUL, RELIABLE SPREADSHEETS!

 

Use this guide to automate virtually any routine task: save yourself hours, days, maybe even weeks! Make Excel do things you thought were impossible, discover macro...

Learning SAP Analytics Cloud
Learning SAP Analytics Cloud

Key Features

  • Predict new opportunities and risks in a few mouse clicks
  • Eliminate complexity with tools that let you plan, analyze, and collaborate in context—in real time
  • Discover, visualize, plan, and predict in a single product with agile BI tools

Book...

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?

With an expanded discussion of network protocols and 45 completely new scenarios, this extensively...

Lessons in Project Management
Lessons in Project Management

Most of the project management books on the market are basically textbooks. They are dry to begin with, and don't focus on the practical advice that most people need to run their projects. Lessons in Project Management, Second Edition does not assume that you are a project manager building a nuclear reactor or sending a...

Applied Engineering Failure Analysis: Theory and Practice
Applied Engineering Failure Analysis: Theory and Practice

Applied Engineering Failure Analysis: Theory and Practice provides a point of reference for engineering failure analysis (EFA) cases, presenting a compilation of case studies covering a 35-year period, from the 1970s to 2012. This period spans the era from the time when slide rules were used routinely for...

Result Page: 81 80 79 78 77 76 75 74 73 72 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy