Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Engineering for Absolute Beginners: Your Guide to Creating Software Products
Software Engineering for Absolute Beginners: Your Guide to Creating Software Products

Start programming from scratch, no experience required. This beginners’ guide to software engineering starts with a discussion of the different editors used to create software and covers setting up a Docker environment. Next, you will learn about repositories and version control along with its uses. Now that you are ready to...

C# Programmer's Cookbook
C# Programmer's Cookbook

Next time you hit the wall with a tough C# development problem, get the code behind the solution—and solve it the right way. The C# Programmer’s Cookbook provides at-a-glance reference to hundreds of C# and Microsoft .NET Framework programming scenarios using a concise, problem/solution format. The book’s organized so...

Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition
Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition

Create a fault-tolerant backend for your real-time applications using Docker, Node.js 10, and MongoDB, and implement HTTPS for hardened security

Key Features

  • Learn server-side programming with JavaScript and Node.js 10
  • Explore the latest JavaScript features and ECMAScript...
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Android Application Development Cookbook - Second Edition
Android Application Development Cookbook - Second Edition

Over 100 recipes to help you solve the most common problems faced by Android Developers today

About This Book

  • Find the answers to your common Android programming problems, from set up to security, to help you deliver better applications, faster
  • Uncover the latest features of Android...
Raspberry Pi 3 Projects for Java Programmers
Raspberry Pi 3 Projects for Java Programmers

Learn the art of building enticing projects by unleashing the potential of Raspberry Pi 3 using Java

About This Book

  • Explore the small yet powerful mini computer in order to run java applications
  • Leverage Java libraries to build exciting projects on home automation, IoT, and Robotics by...
ASP.NET Core 2 Fundamentals: Build cross-platform apps and dynamic web services with this server-side web application framework
ASP.NET Core 2 Fundamentals: Build cross-platform apps and dynamic web services with this server-side web application framework

Imagine the boost in business if you can build large, rich web applications with little code and built-in Windows authentication. With this book, you can gain skills to develop real-world applications with ASP.NET Core 2.

Key Features

  • Adopts the application-centric approach to explain core...
Get Good with Money: Ten Simple Steps to Becoming Financially Whole
Get Good with Money: Ten Simple Steps to Becoming Financially Whole
NEW YORK TIMES, WALL STREET JOURNAL, AND USA TODAY BESTSELLER • A ten-step plan for finding peace, safety, and harmony with your money—no matter how big or small your goals and no matter how rocky the market might be—by the inspiring and savvy “Budgetnista.”

...
Learn Raspberry Pi 2 with Linux and Windows 10
Learn Raspberry Pi 2 with Linux and Windows 10

Learn Raspberry Pi 2 with Linux and Windows 10 will tell you everything you need to know about working with Raspberry Pi 2 so you can get started doing amazing things. You'll learn how to set up your new Raspberry Pi 2 with a monitor, keyboard and mouse, and how to install both Linux and Windows on your new Pi 2.

...

LINQ For Dummies (Computer/Tech)
LINQ For Dummies (Computer/Tech)

Link up with LINQ and see how you can query almost anything!

So you're the inquisitive type? LINQ answers your biggest query — "Why can't I develop database and XML queries in a language I already know?" This book introduces you to LINQ and the .NET Framework technologies, so you can use LINQ to...

Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
unlimited object storage image
Result Page: 387 386 385 384 383 382 381 380 379 378 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy