Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Nikon D600 For Dummies
Nikon D600 For Dummies

A full-color beginner guide to the basics of the Nikon D600

The Nikon D600 is a professional-level full-frame sensor that is sure to attract an audience of DSLR newcomers and pros. This friendly-and-thorough full-color guide shows you how to get a firm grasp on this powerful camera and helps you to ultimately get better photos. *...

Pilates and Conditioning for Athletes: An Integrated Approach to Performance and Recovery
Pilates and Conditioning for Athletes: An Integrated Approach to Performance and Recovery
Gain the competitive edge with the innovative training methods in Pilates and Conditioning for Athletes. This science-based, multidimensional approach to athletic conditioning helps you build a strong and flexible foundation by infusing Pilates into training, resulting in complete training programs that tap into the seven pillars of...
XML Weekend Crash Course (with CD-ROM)
XML Weekend Crash Course (with CD-ROM)
XML Weekend Crash Course covers the ins and outs of XML in 30 sessions. Each session is designed to take 30 minutes to complete, so the Crash Course is an intense 15-hour learning period. You can complete the Crash Course over a single weekend -- but you can also easily adapt the Crash Course sessions to whatever schedule best suits your...
ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

Network Control and Engineering for QOS, Security and Mobility, III
Network Control and Engineering for QOS, Security and Mobility, III
This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con’2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004. This IFIP TC6 Conference was organized by the Universitat de les Illes Balears and...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
MySQL/PHP Database Applications, 2nd Edition
MySQL/PHP Database Applications, 2nd Edition
Learn what it takes to get data-driven Web sites up and running using PHP 5 and MySQL

The popularity of using MySQL and PHP to create organized and efficient Web sites is growing at a steady pace. MySQL has proven itself to be fast, robust, and easy to use. It works well with PHP, and it’s perfect for Web applications for simple to robust...

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
NHibernate 3.0 Cookbook
NHibernate 3.0 Cookbook

NHibernate is an innovative, flexible, scalable, and feature-complete open source project for data access. Although it sounds like an easy task to build and maintain database applications, it can be challenging to get beyond the basics and develop applications that meet your needs perfectly.

The NHibernate Cookbook explains each...

Theoretical Aspects of Computer Science: Advanced Lectures (Lecture Notes in Computer Science)
Theoretical Aspects of Computer Science: Advanced Lectures (Lecture Notes in Computer Science)
The First Summer School on Theoretical Aspects on Computer Science was held at the Institute for Studies in Theoretical Physics and Mathematics (IPM) from July 3-10, 2000.

The idea of organizing a summer school was originated during a conversation between the first and the second editor of this volume in the winter
...
MySQL Cookbook: Solutions for Database Developers and Administrators
MySQL Cookbook: Solutions for Database Developers and Administrators

MySQL’s popularity has brought a flood of questions about how to solve specific problems, and that’s where this cookbook is essential. When you need quick solutions or techniques, this handy resource provides scores of short, focused pieces of code, hundreds of worked-out examples, and clear, concise explanations for...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy