Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Foundation Version Control for Web Developers (Foundations Apress)
Foundation Version Control for Web Developers (Foundations Apress)

Since you happen to be reading through the opening pages of Foundation Version Control for Web Developers then it’s safe to say you have some interest in finding out a little bit more about version control. It may be true that this new interest isn’t actually your own, but instead comes from a friend, colleague, or employer who...

The OS X Mountain Lion Pocket Guide (Peachpit Pocket Guide)
The OS X Mountain Lion Pocket Guide (Peachpit Pocket Guide)
A lot has happened since Apple introduced OS X a decade ago (then called “Mac OS X”). What started as an incomplete replacement for an established operating system has become not only the backbone of today’s powerful Mac computers, but also the foundation for the iPhone, iPad, iPod touch, and Apple TV. At one...
PostgreSQL 11 Server Side Programming Quick Start Guide: Effective database programming and interaction
PostgreSQL 11 Server Side Programming Quick Start Guide: Effective database programming and interaction

Extend PostgreSQL using PostgreSQL server programming to create, test, debug, and optimize a range of user-defined functions in your favorite programming language

Key Features

  • Learn the concepts of PostgreSQL 11 with lots of real-world datasets and examples
  • Learn queries,...
Internet Forensics
Internet Forensics

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to ...

Java 2 Web Developer Certification Study Guide, 2nd Edition
Java 2 Web Developer Certification Study Guide, 2nd Edition

Here’s the book you need to prepare for Exam 310-080, Sun Certified Web Component Developer for J2EE Platform.

This Study Guide provides:

  • In-depth coverage of every exam objective
  • Practical information on programming servlets, developing JSP pages,...
Methodology and Technology for Power System Grounding
Methodology and Technology for Power System Grounding

Grounding is the fundamental measures to ensure the safe operation of power systems, including power apparatus and control/monitoring systems, and guarantee the personal safety. Grounding technology is an interdiscipline involving electrical engineering, high voltage technology, electric safety, electromagnetics, numerical analysis, and...

Marine Polysaccharides: Food Applications
Marine Polysaccharides: Food Applications

Increased public awareness of the importance of healthy living presents new challenges for the commercial food processing sector. The industry is always on the hunt for novel and safe additives with functional properties that can be used to impart healthy and appealing properties to foods. While the ocean is known as a conventional source of...

Video Systems in an IT Environment: The Essentials of Professional Networked Media
Video Systems in an IT Environment: The Essentials of Professional Networked Media
Audio/Video (AV) systems and Information Technology (IT) are colliding. Broadcasters and other AV professionals are impacted by the transition to IT components and techniques. This is the first book to focus on the intersection of AV and IT concepts. It includes technology reviews and the tools to understand and evaluate key aspects of hybrid AV...
Safer Surgery
Safer Surgery

Operating theatres are very private workplaces. There have been few research investigations into how highly trained doctors and nurses work together to achieve safe and efficient anaesthesia and surgery. While there have been major advances in surgical and anaesthetic procedures, there are still significant risks for patients during operations...

Careers in Architecture
Careers in Architecture

Ideal for college students or anyone ready to go back to school, this series explores specific areas of interest and helps job seekers determine which job in that field suits them.

  • Breaks down specific educational requirements and additional training
  • Surveys the salaries and job opportunities to help seekers...
Hands-On Concurrency with Rust: Confidently build memory-safe, parallel, and efficient software in Rust
Hands-On Concurrency with Rust: Confidently build memory-safe, parallel, and efficient software in Rust

Get to grips with modern software demands by learning the effective uses of Rust's powerful memory safety.

Key Features

  • Learn and improve the sequential performance characteristics of your software
  • Understand the use of operating system processes in a high-scale...
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy