Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

I suppose there are several questions that may be running through your head as you contemplate reading this book: Who is the intended audience for this book? How is this book different from book ‘x’ (insert your favorite title here)? Why should I buy it? Because these are all fair questions and I am asking you to plunk...

Beginning ASP.NET E-Commerce in C#: From Novice to Professional (Expert's Voice in .Net)
Beginning ASP.NET E-Commerce in C#: From Novice to Professional (Expert's Voice in .Net)
Welcome to Beginning ASP.NET E-Commerce in C#: From Novice to Professional! This book is a practical, step-by-step ASP.NET and SQL Server tutorial that teaches you real-world development practices. Guiding you through every step of the design and build process, this tutorial will teach you how to create high-quality, full-featured, extensible...
MongoDB in Action
MongoDB in Action

Databases are the workhorses of the information age. Like Atlas, they go largely unnoticed in supporting the digital world we’ve come to inhabit. It’s easy to forget that our digital interactions, from commenting and tweeting to searching and sorting, are in essence interactions with a database. Because of this fundamental...

Michael Abrash's Graphics Programming Black Book (Special Edition)
Michael Abrash's Graphics Programming Black Book (Special Edition)
Michael Abrash's Graphics Programming Black Book is a collection of the author's previous books on assembly language and graphics programming, as well as past columns for Dr. Dobb's magazine. Though much of the book (such as 8088/286/386 assembly language optimization and VGA graphics programming) is out-of-date by now, the reader can see...
Windows Vista for Starters: The Missing Manual
Windows Vista for Starters: The Missing Manual
Fast-paced and easy to use, this concise book teaches you the basics of Windows Vista so you can start using this operating system right away. Written by "New York Times" columnist, bestselling author, Emmy-winning CBS News correspondent and Missing Manuals creator David Pogue, the book will help you:
  • Navigate the desktop,...
Tinkering: Kids Learn by Making Stuff
Tinkering: Kids Learn by Making Stuff

After-school and out-of-school programs—as well as home schooling—have been growing steadily for nearly a decade, but instructors are still searching for high-interest content that ties into science standards without the rigidity of current classroom canon. The author draws on more than 20 years of experience doing...

XSLT and XPath On The Edge, Unlimited Edition
XSLT and XPath On The Edge, Unlimited Edition
Extensible Stylesheet Language Transformations, along with the XML Path Language, give you the power to transform XML documents into HTML documents, or to other XML documents that you can use in Web-based applications. But how do you implement XSLT in the real world? This book provides the answers. Covering everything from reformatting numbers to...
Logic in Computer Science: Modelling and Reasoning about Systems
Logic in Computer Science: Modelling and Reasoning about Systems
"Huth and Ryan explain a variety of fundamental topics in formal computer science logic and help readers understand how to follow and expand on them." H.J. Bender, Any Language Communications, Inc., CHOICE

"Readers searching for a good book on formal methods will find it here." Choice

The
...
Semantic Techniques in Quantum Computation
Semantic Techniques in Quantum Computation

The idea of quantum computation, in the algorithmic sense, originated from the suggestion by Feynman (1982) that a computer based on the principles of quantum mechanics might be capable of efficiently simulating quantum systems of interest to physicists; such simulation seems to be very difficult with classical computers. Feynman’s...

How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today's WLANs, introduces high-security wireless protocols new to the marketplace, and offers step-by-step instructions...
Real World XML Web Services: For VB and VB .NET Developers
Real World XML Web Services: For VB and VB .NET Developers

"You are holding in your hands my favorite book on Web services and .NET. What else can I say? Buy this book now, and be prepared for a new way of coding!"
—Keith Ballinger, Program Manager for XML Web Services, Microsoft

"If you've been searching for a book that goes beyond the...

Pattern Matching Algorithms
Pattern Matching Algorithms
Issues of matching and searching on elementary discrete structures arise pervasively in computer science and many of its applications, and their relevance is expected to grow as information is amassed and shared at an accelerating pace. Several algorithms were discovered as a result of these needs, which in turn created the subfield of Pattern...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy