Home | Amazing | Today | Tags | Publishers | Years | Search 
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know....

Connecting Arduino to the Web: Front End Development Using JavaScript
Connecting Arduino to the Web: Front End Development Using JavaScript
Create physical interfaces that interact with the Internet and web pages. With Arduino and JavaScript you can create interactive physical displays and connected devices that send data to or receive data from the web. You'll take advantage of the processes needed to set up electronic components, collect data, and create web pages able to...
Absolute Beginners Guide to Computing
Absolute Beginners Guide to Computing

Learn and understand how you can perform a wide range of tasks on your new Windows computer, including managing files, browsing the internet, and protecting yourself, as well as interacting with Cortana.

Using Absolute Beginners Guide to Computing you will see how to use Windows, and how you can connect and...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)
The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.

 

Byte, September 1995

 

...
Distributed Algorithms: An Intuitive Approach (The MIT Press)
Distributed Algorithms: An Intuitive Approach (The MIT Press)

A comprehensive guide to distributed algorithms that emphasizes examples and exercises rather than mathematical argumentation.

This book offers students and researchers a guide to distributed algorithms that emphasizes examples and exercises rather than the intricacies of mathematical models. It avoids mathematical...

Essential Skills for Hackers
Essential Skills for Hackers

Essential Skills for Hackers is about the skills you need to be in the elite hacker family.

The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go...

Macs For Dummies
Macs For Dummies

Take a bite out of all your Mac has to offer with this bestselling guide

So, you joined the cool kids club and bought a Mac. Kudos! Now, do you dare admit to your sophisticated Mac mates that you still need some help figuring out how it works? No worries, Macs For Dummies is here to help! In full color for the first...

Teach Yourself VISUALLY iPhone 7: Covers iOS 10 and all models of iPhone 6s, iPhone 7, and iPhone SE (Teach Yourself VISUALLY (Tech))
Teach Yourself VISUALLY iPhone 7: Covers iOS 10 and all models of iPhone 6s, iPhone 7, and iPhone SE (Teach Yourself VISUALLY (Tech))

A visual guide to the latest iPhone technology

Teach Yourself VISUALLY iPhone is the visual guide to mastering the powerful features and functionality of Apple's latest smartphone. Whether you're a newbie or upgrading to the latest model, this easy to navigate guide features visually rich tutorials and plenty...

Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner

Build distributed applications that resolve data ownership issues when working with transactions between multiple parties

Key Features

  • Explore a perfect balance between theories and hands-on activities
  • Discover popular Blockchain use cases such as Bitcoin
  • ...
Building Django 2.0 Web Applications: Create enterprise-grade, scalable Python web applications easily with Django 2.0
Building Django 2.0 Web Applications: Create enterprise-grade, scalable Python web applications easily with Django 2.0

Go from the initial idea to a production-deployed web app using Django 2.0.

Key Features

  • A beginners guide to learning python's most popular framework, Django
  • Build fully featured web projects in Django 2.0 through examples.
  • Deploy web applications in...
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy