Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Ultimate Game Design: Building Game Worlds
Ultimate Game Design: Building Game Worlds

Filled with tips and techniques from veteran game designers at Sony, Blizzard, Disney, LucasArts, Activision, 3DO, and many others!

Plan, design, and create enthralling game environments complete with richly animated characters and objects by applying the expert techniques described in this one-of-a-kind resource. Veteran game developer...

Beginning Apache Pig: Big Data Processing Made Easy
Beginning Apache Pig: Big Data Processing Made Easy
Learn to use Apache Pig to develop lightweight big data applications easily and quickly. This book shows you many optimization techniques and covers every context where Pig is used in big data analytics. Beginning Apache Pig shows you how Pig is easy to learn and requires relatively little time to develop big data...
Manga Studio 5, Beginner's Guide
Manga Studio 5, Beginner's Guide

An extensive and fun guide to let your imagination on loose using Manga Studio 5

Overview

  • Illustrated with real-world examples, we embark on a journey of a comic's creation from initial idea to finished page
  • Discover methods for emulating analog creation digitally and investigate ways...
The Introverted Presenter: Ten Steps for Preparing and Delivering Successful Presentations
The Introverted Presenter: Ten Steps for Preparing and Delivering Successful Presentations

The introvert is a personality type that draws energy from the outside inward. According to standard personality testing assessments, most people are introverts and no group is more introverted than technical professionals. Introverts are congenitally programmed to recoil from the prospect of public speaking with fear and loathing, yet making...

Javascript Programmer's Reference
Javascript Programmer's Reference
The book is aimed at people who already have some knowledge of JavaScript and need a companion volume to their daily work. It is primarily aimed at the experienced practitioner, and so does not attempt to be a tutorial for the beginner.

For a tutorial book, we suggest Paul Wilton's Beginning
...
sed & awk (2nd Edition)
sed & awk (2nd Edition)
The book begins with an overview and a tutorial that demonstrate a progression in functionality from grep to sed to awk. sed and awk share a similar command-line syntax, accepting user instructions in the form of a script. Because all three programs use UNIX regular expressions, an entire chapter is devoted to understanding UNIX regular expression...
Making Java Groovy
Making Java Groovy

Summary

Making Java Groovy is a practical handbook for developers who want to blend Groovy into their day-to-day work with Java. It starts by introducing the key differences between Java and Groovy—and how you can use them to your advantage. Then, it guides you step-by-step through realistic...

Build Awesome Command-Line Applications in Ruby 2: Control Your Computer, Simplify Your Life
Build Awesome Command-Line Applications in Ruby 2: Control Your Computer, Simplify Your Life

Speak directly to your system. With its simple commands, flags, and parameters, a well-formed command-line application is the quickest way to automate a backup, a build, or a deployment and simplify your life. With this book, you'll learn specific ways to write command-line applications that are easy to use, deploy, and maintain, using a...

Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

The Ultimate Book on Group Policy

Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft...

Automating System Administration with Perl: Tools to Make You More Efficient
Automating System Administration with Perl: Tools to Make You More Efficient

If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely...

Beginning JavaScript Second Edition
Beginning JavaScript Second Edition

JavaScript is the preferred programming language for Web page applications, letting you enhance your sites with interactive, dynamic, and personalized pages. This fully updated guide shows you how to take advantage of JavaScript’s client-side scripting techniques for the newest versions of Netscape and Internet Explorer, even if...

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy