Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning C# 2008: From Novice to Professional, Second Edition
Beginning C# 2008: From Novice to Professional, Second Edition
This book is for anyone who wants to write good C# code—even if you have never programmed before. Writing good code can be a challenge—there are so many options, especially in a .NET language like C#. If you want to really get the best from a programming language, you need to know which features work best in which situations and...
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

Pro JavaScript for Web Apps
Pro JavaScript for Web Apps
Client-side web app development has always been the poor cousin to server-side coding. This started because browsers and the devices they run on have been less capable than enterprise-class servers. To provide any kind of serious web app functionality, the server had to do all of the heavy lifting for the browsers, which was pretty...
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Visual Studio Tools for Office: Using C# with Excel, Word, Outlook, and InfoPath
Visual Studio Tools for Office: Using C# with Excel, Word, Outlook, and InfoPath

Visual Studio Tools for Office is both the first and the definitive book on VSTO 2005 programming, written by the inventors of the technology. VSTO is a set of tools that allow professional developers to use the full power of Visual Studio .NET and the .NET Framework to put code behind Excel...

Apache Security
Apache Security

This all-purpose guide for locking down Apache arms readers with all the information they need to securely deploy applications. Administrators and programmers alike will benefit from a concise introduction to the theory of securing Apache, plus a wealth of practical advice and real-life examples. Topics covered include...

Refactoring Databases : Evolutionary Database Design
Refactoring Databases : Evolutionary Database Design

Refactoring has proven its value in a wide range of development projectshelping software professionals improve system designs, maintainability, extensibility, and performance. Now, for the first time, leading agile methodologist Scott Ambler and renowned consultant Pramodkumar Sadalage introduce powerful refactoring techniques...

Windows 2000 API SuperBible
Windows 2000 API SuperBible

Following in the tradition of the Win 95 and Win32 NT SuperBibles, this book is a comprehensive reference for all of the APIs needed by the Windows programmer. It is arranged topically with related functions presented in the same chapter. Using relevant examples that are complete and appropriate to the task at hand, the user will be able to...

Programming MapPoint in .NET
Programming MapPoint in .NET

Interactive web maps generated by MapPoint-Microsoft's popular mapping technology are crucial for businesses in a number of fields, including real estate, package delivery, and commercial air travel. In a word, MapPoint provides businesses with "location." Specifically, it provides an integrated set of products,...

Linux Network Servers (Craig Hunt Linux Library)
Linux Network Servers (Craig Hunt Linux Library)
Authoritative Answers to All Your Linux Network Server Questions—Specifically for Linux Administrators
Tap into Linux's impressive capabilities as a network server. Written by one of the world’s leading Linux system administration experts, Linux Network Servers teaches you,
...
Database Management Systems
Database Management Systems
DATABASE MANAGEMENT SYSTEMS is designed for use in a course in databases. This book is distinctive in its emphasis on the practical side of databases. This means that it has unique coverage of database design, uses SQL throughout the book to demonstrate different concepts, and has an emphasis on query evaluation and optimization. In this revision...
unlimited object storage image
Result Page: 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy