Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C: How to Program (6th Edition)
C: How to Program (6th Edition)

Welcome to the C programming language—and to C++, too! This book presents leadingedge computing technologies for students, instructors and software development professionals.

At the heart of the book is the Deitel signature “live-code approach.” Concepts are presented in the context of complete working...

Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
Send Me a Message: A Step-by-Step Approach to Business and Professional Writing (Student Book)
Send Me a Message: A Step-by-Step Approach to Business and Professional Writing (Student Book)

With the expansion of global business and the Internet, communicating clearly in written English has become essential. The step-by-step approach in Send Me A Message allows students to develop a core set of expressions and techniques that they can use to communicate clearly and appropriately in a variety of formats.

...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Windows Server 2008 For Dummies (Computer/Tech)
Windows Server 2008 For Dummies (Computer/Tech)
If you’re curious, but hesitant, about finding your way around Microsoft’s new Windows Server 2008, Windows Server 2008 For Dummies is the book for you. This friendly reference shows you everything you need to know — from installation and deployment to building and running a Windows Server 2008 network.

...

Pro PHP Security
Pro PHP Security

The Internet is a dangerous place for applications. In fact, it is reasonable to say that you
couldn’t create a less secure system if you tried. It is anonymous, uncontrolled, always on,
and instantly accessible from anywhere. This is a world where every bad actor, cracker, script
kiddie, and scam artist is your
...

Apache Flume: Distributed Log Collection for Hadoop - Second Edition
Apache Flume: Distributed Log Collection for Hadoop - Second Edition

Design and implement a series of Flume agents to send streamed data into Hadoop

About This Book

  • Construct a series of Flume agents using the Apache Flume service to efficiently collect, aggregate, and move large amounts of event data
  • Configure failover paths and load balancing to remove...
Installing, Troubleshooting, and Repairing Wireless Networks
Installing, Troubleshooting, and Repairing Wireless Networks
CD-ROM packed with diagnostic and troubleshooting software!

PRACTICAL, AUTHORITATIVE GUIDANCE ON KEEPING A WIRELESS NETWORK WORKING HARD FOR YOUR BUSINESS!

With annual equipment sales projected to grow to more than $5 billion by mid-decade, wireless networking is clearly a technology whose time has...

Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting the Internet into a total communication system which would allow people to talk to each other,...
Android Recipes: A Problem-Solution Approach
Android Recipes: A Problem-Solution Approach

Android continues to be one of the leading mobile OS and development platforms driving today's mobile innovations and the apps ecosystem. Android appears complex, but offers a variety of organized development kits to those coming into Android with differing programming language skill sets.

Android Recipes: A
...

Using Kindle Fire HD
Using Kindle Fire HD

Learn how to use your Kindle Fire with ease and no jargon. Clear, concise, short and to the point... Using Kindle Fire HD, is the essential guide to getting around Amazon’s tablet/e-book reader. This book explores setting up your new Kindle and registering; navigating around the interface and what all the buttons, lists and icons are...

How to Do Everything with Mac OS X Panther
How to Do Everything with Mac OS X Panther
Experience the excitement of Apple’s revolutionary new release with help from this hands-on guide. Use the Finder to easily navigate files, folders, and applications and customize its display to meet your needs. Set up dozens of accounts and change users without logging out using the fast user switching feature. Access any open window or...
unlimited object storage image
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy