Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PMP Exam Prep, Eighth Edition - Updated: Rita's Course in a Book for Passing the PMP Exam
PMP Exam Prep, Eighth Edition - Updated: Rita's Course in a Book for Passing the PMP Exam

This book has been FULLY updated to reflect PMI's changes to the PMP Exam Content Outline dated June 2015, and is intended for all PMP exams taken AFTER November 1st, 2015. If you are taking the PMP exam on or before November 1st of 2015, please contact the Publisher.

Can you imagine valuing a book so much that you...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
The Art of Computer Programming, Vol. 1: Fundamental Algorithms, 3rd Edition
The Art of Computer Programming, Vol. 1: Fundamental Algorithms, 3rd Edition

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.

Byte, September 1995

 

I can't begin to tell you how many pleasurable...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Beginning Perl Web Development: From Novice to Professional
Beginning Perl Web Development: From Novice to Professional

Beginning Perl Web Development: From Novice to Professional introduces you to the world of Perl Internet application development. This book tackles all areas crucial to developing your first web applications and includes a powerful combination of real-world examples coupled with advice. Topics range from serving and consuming RSS feeds,...

Art of Computer Programming, Volume 2: Seminumerical Algorithms (3rd Edition)
Art of Computer Programming, Volume 2: Seminumerical Algorithms (3rd Edition)

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.

 

Byte, September 1995

 

...
The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)
The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.

 

Byte, September 1995

 

...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Apache Flume: Distributed Log Collection for Hadoop - Second Edition
Apache Flume: Distributed Log Collection for Hadoop - Second Edition

Design and implement a series of Flume agents to send streamed data into Hadoop

About This Book

  • Construct a series of Flume agents using the Apache Flume service to efficiently collect, aggregate, and move large amounts of event data
  • Configure failover paths and load balancing to remove...
Medical Image Analysis
Medical Image Analysis

The expanded and revised edition will split Chapter 4 to include more details and examples in FMRI, DTI, and DWI for MR image modalities. The book will also expand ultrasound imaging to 3-D dynamic contrast ultrasound imaging in a separate chapter.

A new chapter on Optical Imaging Modalities elaborating microscopy, confocal...

Amazon Web Services For Dummies
Amazon Web Services For Dummies

Create dynamic cloud-based websites with Amazon Web Services and this friendly guide!

As the largest cloud computing platform in the world, Amazon Web Services (AWS) provides one of the most popular web services options available. This easy-to-understand guide is the perfect introduction to the Amazon Web Services platform...

Result Page: 34 33 32 31 30 29 28 27 26 25 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy