Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Design Patterns: A Hands-On Experience with Real-World Examples
Java Design Patterns: A Hands-On Experience with Real-World Examples

Get hands-on experience implementing 26 of the most common design patterns using Java and Eclipse. In addition to Gang of Four (GoF) design patterns, you will also learn about alternative design patterns, and understand the criticisms of design patterns with an overview of anti-patterns. For each pattern you will see at least...

Design Patterns in C#: A Hands-on Guide with Real-World Examples
Design Patterns in C#: A Hands-on Guide with Real-World Examples
Get hands-on experience with each Gang of Four design pattern using C#. For each of the patterns, you’ll see at least one real-world scenario, a coding example, and a complete implementation including output.

In the first part of Design Patterns in C#, you will cover the 23 Gang of Four (GoF) design...
Dynamic Web Programming and HTML5
Dynamic Web Programming and HTML5

With organizations and individuals increasingly dependent on the Web, the need for competent, well-trained Web developers and maintainers is growing. Helping readers master Web development, Dynamic Web Programming and HTML5 covers specific Web programming languages, APIs, and coding techniques and provides an...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

JBoss EAP6 High Availability
JBoss EAP6 High Availability

From the basic uses of JBoss EAP6 through to advanced clustering techniques, this book is the perfect way to learn how to achieve a system designed for high availability. All that's required is some basic knowledge of Linux/Unix.

Overview

  • A thorough introduction to the new domain mode provided by...
Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
Theoretical Aspects of Computer Science: Advanced Lectures (Lecture Notes in Computer Science)
Theoretical Aspects of Computer Science: Advanced Lectures (Lecture Notes in Computer Science)
The First Summer School on Theoretical Aspects on Computer Science was held at the Institute for Studies in Theoretical Physics and Mathematics (IPM) from July 3-10, 2000.

The idea of organizing a summer school was originated during a conversation between the first and the second editor of this volume in the winter
...
MySQL Cookbook: Solutions for Database Developers and Administrators
MySQL Cookbook: Solutions for Database Developers and Administrators

MySQL’s popularity has brought a flood of questions about how to solve specific problems, and that’s where this cookbook is essential. When you need quick solutions or techniques, this handy resource provides scores of short, focused pieces of code, hundreds of worked-out examples, and clear, concise explanations for...

Developing Turn-Based Multiplayer Games: with GameMaker Studio 2 and NodeJS
Developing Turn-Based Multiplayer Games: with GameMaker Studio 2 and NodeJS
Create your first turn-based multiplayer game using GameMaker Studio 2’s built-in networking functions as well as using a simple NodeJS server. This book introduces you to the complexities of network programming and communication, where the focus will be on building the game from the ground up.  You will...
Enterprise JavaBeans 3.1
Enterprise JavaBeans 3.1

Learn how to code, package, deploy, and test functional Enterprise JavaBeans with the latest edition of this bestselling guide. Written by the developers of JBoss EJB 3.1, this book not only brings you up to speed on each component type and container service in this implementation, it also provides a workbook with several hands-on...

Practical Django Projects (Pratical Projects)
Practical Django Projects (Pratical Projects)
Build a django content management system, blog, and social networking site with James Bennett as he introduces the popular Django framework. You’ll work through the development of each project, implementing and running the applications while learning new features along the way.

Web frameworks are playing a major role in...

Result Page: 28 27 26 25 24 23 22 21 20 19 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy