Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

Expert T-SQL Window Functions in SQL Server 2019: The Hidden Secret to Fast Analytic and Reporting Queries
Expert T-SQL Window Functions in SQL Server 2019: The Hidden Secret to Fast Analytic and Reporting Queries
Become an expert who can use window functions to solve T-SQL query problems. Replace slow cursors and self-joins with queries that are easy to write and perform better. This new edition provides expanded examples, including a chapter from the world of sports, and covers the latest performance enhancements through SQL Server 2019. ...
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

2016 Photographer's Market: How and Where to Sell Your Photography
2016 Photographer's Market: How and Where to Sell Your Photography

The Successful Photographer's Secret!

Thousands of successful photographers have trusted Photographer's Market as a resource for growing their businesses. This edition contains the most comprehensive and up-to-date market contacts for working photographers today: magazines, book publishers, greeting card...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

JavaScript Demystified
JavaScript Demystified

Every web surfer knows a classy web site when he sees one, because it has eyecatching features that make the site outstanding among other sites on the web.

Developers of these sites leave web surfers in awe not by using fancy animation or provocative pictures, but by using subtle tricks such as fl oating menus and moveable
...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Filmmaking For Dummies (Career/Education)
Filmmaking For Dummies (Career/Education)
"I found Filmmaking For Dummies a thorough and informative read: a complete A to Z that demystifies not only production, but pre- and post- production as well. Stoller paints a picture of filmmaking so basic that you'd have to be not just a dummy but completely braindead if you're unable to make your own movie after closing the...
Frommer's Kauai (Frommer's Complete)
Frommer's Kauai (Frommer's Complete)
On any list of the world’s most spectacular islands, Kauai ranks right up there with Bora Bora, Huahine, and Rarotonga. All the elements are here: moody rainforests, majestic cliffs, jagged peaks, emerald valleys, palm trees swaying in the breeze, daily rainbows, and some of the most spectacular golden beaches you’ll find...
SOA Modeling Patterns for Service Oriented Discovery and Analysis
SOA Modeling Patterns for Service Oriented Discovery and Analysis

One of the most challenging tasks in today’s business and information technology (IT) environments is to communicate a solution to an organizational problem in a simple manner that can be easily understood by business and IT personnel alike. Is it also arduous to explain in simple words how a remedy to an enterprise concern can be...

Result Page: 31 30 29 28 27 26 25 24 23 22 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy