Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Web and Mobile ArcGIS Server Applications with JavaScript
Building Web and Mobile ArcGIS Server Applications with JavaScript

Improve your knowledge and career prospects in web or mobile application development with this step-by-step practical guide to ArcGIS Server. Gives a good grounding in everything from creating maps to network analysis.

Overview

  • Develop ArcGIS Server applications with JavaScript, both for traditional web...
SOI Lubistors: Lateral, Unidirectional, Bipolar-type Insulated-gate Transistors
SOI Lubistors: Lateral, Unidirectional, Bipolar-type Insulated-gate Transistors

Advanced level consolidation of the technology, physics and design aspects of silicon-on-insulator (SOI) lubistors

No comprehensive description of the physics and possible applications of the Lubistor can be found in a single source even though the Lubistor is already being used in SOI LSIs. The book provides, for the...

Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

Maximum Energy for Life: A 21-Day Strategic Plan to Feel Great, Reverse the Aging Process, and Optimize Your Health
Maximum Energy for Life: A 21-Day Strategic Plan to Feel Great, Reverse the Aging Process, and Optimize Your Health

For more than twenty-five years, Mackie Shilstone has helped the world’s most famous sports figures, elected officials, and businesspeople become more focused, eat healthier, and achieve greater success at what they do best. Now, Shilstone has distilled his performance-enhancing secrets into a book that can help anyone feel younger, live...

Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Interviewing and Diagnostic Exercises for Clinical and Counseling Skills Building
Interviewing and Diagnostic Exercises for Clinical and Counseling Skills Building
This book contains twenty client profiles to use in practicing interviewing and diagnostic skills. Ten profiles are of adult cases ranging in age from eighteen to seventy (chapters 3-12). Ten profiles are of child or teen cases ranging in age from seven to seventeen (chapters 13-22). In addition to age, the twenty profiles vary in terms of...
The Nidoviruses: Toward Control of SARS and other Nidovirus Diseases (Advances in Experimental Medicine and Biology)
The Nidoviruses: Toward Control of SARS and other Nidovirus Diseases (Advances in Experimental Medicine and Biology)
This book summarizes the keynote and plenary speeches and posters of the “Xth International Nidovirus Symposium: Toward Control of SARS and Other Nidovirus Diseases” that was held in Colorado Springs, Colorado, June 25–30, 2005. The nine previous meetings of scientists investigating the molecular biology and...
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
Green Petroleum: How Oil and Gas Can Be Environmentally Sustainable
Green Petroleum: How Oil and Gas Can Be Environmentally Sustainable

Can "green petroleum" reverse global warming and bring down high gasoline prices?  Written in non-technical language for the layperson, this book investigates and details how the oil and gas industry can "go green" with new processes and technologies, thus bringing the world's most important industry closer to...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Comet and Reverse Ajax: The Next-Generation Ajax 2.0 (Firstpress)
Comet and Reverse Ajax: The Next-Generation Ajax 2.0 (Firstpress)
One of the most basic laws of a web application is that the client, not the server, must initiate any communication between the two. There are a number of common–use cases where, ideally, the server would like to talk to the client—dashboards and monitoring apps, chat rooms and other collaborations, and progress reports on...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy