Home | Amazing | Today | Tags | Publishers | Years | Search 
Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)

The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP...

Learning Nagios 4
Learning Nagios 4

Learn how to set up Nagios 4 in order to monitor your systems efficiently About This Book Set up, configure, and manage Nagios 4 to secure and monitor your system Learn how to use libnagios and NERD to process and handle queries Packed with lots of tips, tricks and illustrations to explain the Nagios configuration and monitoring concepts in a...

Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits
Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about...

Developing Mobile Web ArcGIS Applications
Developing Mobile Web ArcGIS Applications

Learn to build your own engaging and immersive geographic applications with ArcGIS

About This Book

  • Create multi-utility apps for mobiles using ArcGIS Server quickly and easily
  • Start with the basics and move through to creating advanced mobile ArcGIS apps
  • Plenty of...
10 Ways to Stay Broke...Forever: Why Be Rich When You Can Have This Much Fun?
10 Ways to Stay Broke...Forever: Why Be Rich When You Can Have This Much Fun?

How to change your free-spending ways, live luxuriously on a budget, and build a sound financial future

From the founders of GoldenGirlFinance.ca comes a new book on how to get your financial house in order and enjoy the freedom and happiness that comes with a secure financial future. In 10 Ways to Stay Broke. . ....

Java SE8 for the Really Impatient: A Short Course on the Basics (Java Series)
Java SE8 for the Really Impatient: A Short Course on the Basics (Java Series)

Eagerly anticipated by millions of programmers, Java SE 8 is the most important Java update in many years. The addition of lambda expressions (closures) and streams represents the biggest change to Java programming since the introduction of generics and annotations.

 

...
Develop on Yammer: Social Integration for Modern Business Applications
Develop on Yammer: Social Integration for Modern Business Applications

Develop on Yammer is your guide to integrating the Yammer social network with your company’s application ecosystem. By developing custom apps and features on the Yammer platform, you can make your workplace more productive, encourage communication and feedback, and get your colleagues collaborating across a range of platforms,...

Learning Spring Application Development
Learning Spring Application Development

Develop dynamic, feature-rich, and robust Spring-based applications using the Spring Framework

About This Book

  • Build and deploy Spring-powered, production-grade applications and services with minimal fuss
  • Discover the key Spring framework-related technology standards such as Spring core,...
Windows Runtime via C# (Developer Reference)
Windows Runtime via C# (Developer Reference)

Delve inside the Windows Runtime - and learn best ways to design and build Windows Store apps. Guided by Jeffrey Richter, a recognized expert in Windows and .NET programming, along with principal Windows consultant Maarten van de Bospoort, you'll master essential concepts. And you'll gain practical insights and tips for how to...

The Mobile Application Hacker's Handbook
The Mobile Application Hacker's Handbook

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward...

Getting Started with SQL Server 2012 Cube Development
Getting Started with SQL Server 2012 Cube Development

Written specifically for SQL Server developers, this is a great primer on Analysis Services and cube development. With lots of practical exercises and real-world scenarios, you'll be up and running in no time.

Overview

  • Learn how to develop a complete business intelligence solution using SQL Server...
Visual Studio 2012 and .NET 4.5 Expert Development Cookbook
Visual Studio 2012 and .NET 4.5 Expert Development Cookbook

Put Visual Studio and .NET together and the results are empowering. With over 40 recipes in this Cookbook you can learn to integrate them both to achieve unparalleled results in applications that are in tune with modern technologies.

Overview

  • Step-by-step instructions to learn the power of .NET...
Result Page: 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy