Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Java 9 for Programmers (4th Edition) (Deitel Developer Series)
Java 9 for Programmers (4th Edition) (Deitel Developer Series)

The professional programmer’s Deitel® guide to Java® 9 and the powerful Java platform

 

Written for programmers with a background in another high-level language, this book applies the...

Advanced Technical Analysis of ETFs: Strategies and Market Psychology for Serious Traders
Advanced Technical Analysis of ETFs: Strategies and Market Psychology for Serious Traders

A comprehensive book filled with technical analysis tools and strategies for the advanced ETF trader

Advanced Technical Analysis of ETFs is an important resource for sophisticated ETF traders that contains a wealth of expanded strategies for technical trade setups and includes the author's best real trade examples...

The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)
The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)

Extensively revised to reflect improved Scrum practices and tools, this edition adds an all-new section of tips from the field. 



The 1st Edition has a 5-Star Amazon Customer Rating and 135 reviews.

Thousands of organizations are adopting Scrum to
...
Refactoring to Patterns (The Addison-Wesley Signature Series)
Refactoring to Patterns (The Addison-Wesley Signature Series)

In 1994, Design Patterns changed the landscape of object-oriented development by introducing classic solutions to recurring design problems. In 1999, Refactoring revolutionized design by introducing an effective process for improving code. With the highly anticipated Refactoring to Patterns, Joshua...

Random Curves: Journeys of a Mathematician
Random Curves: Journeys of a Mathematician
These autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital signature, cover many topics besides his own personal career in mathematics and cryptography - travels to the Soviet Union, Latin America, Vietnam and elsewhere, political activism, and academic controversies relating to math...
Developer Testing: Building Quality into Software (Addison-Wesley Signature Series (Cohn))
Developer Testing: Building Quality into Software (Addison-Wesley Signature Series (Cohn))

How do successful agile teams deliver bug-free, maintainable software—iteration after iteration? The answer is: By seamlessly combining development and testing. On such teams, the developers write testable code that enables them to verify it using various types of...

The C++ Standard Library: A Tutorial and Reference (2nd Edition)
The C++ Standard Library: A Tutorial and Reference (2nd Edition)

The Best-Selling C++ Resource

Now Updated for C++11

 

The C++ standard library provides a set of common classes and interfaces that greatly extend the core C++ language. The library, however, is not self-explanatory. To make full...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.>

  • Comprehensive coverage and practical examples of the industry...

User Stories Applied: For Agile Software Development (Addison-Wesley Signature Series)
User Stories Applied: For Agile Software Development (Addison-Wesley Signature Series)
Thoroughly reviewed and eagerly anticipated by the agile community, User Stories Applied offers a requirements process that saves time, eliminates rework, and leads directly to better software.

The best way to build software that meets users' needs is to begin with "user stories": simple, clear, brief descriptions of...

Implementation Patterns (Addison-Wesley Signature)
Implementation Patterns (Addison-Wesley Signature)
Software Expert Kent Beck Presents a Catalog of Patterns Infinitely Useful for Everyday Programming

 

Great code doesn’t just function: it clearly and consistently communicates your intentions, allowing other programmers to understand your code, rely on it, and modify...

Result Page: 12 11 10 9 8 7 6 5 4 3 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy