Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

Puzzles for Programmers and Pros
Puzzles for Programmers and Pros

Solving puzzles demands a mindset that starts with a vulnerable openness followed by a rigorous drive to find a solution. Whether you're preparing for a programming job interview or just like a challenge, this book takes you on a tour of problem-solving techniques so you can dramatically improve your skills. You'll learn how to conquer simple...

Exam Ref 70-486: Developing ASP.NET MVC 4 Web Applications
Exam Ref 70-486: Developing ASP.NET MVC 4 Web Applications

Prepare for Microsoft Exam 70-486—and help demonstrate your real-world mastery of developing ASP.NET MVC-based solutions. Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Specialist level.

...

Exam Ref 70-487 Developing Windows Azure and Web Services (MCSD)
Exam Ref 70-487 Developing Windows Azure and Web Services (MCSD)

Prepare for Microsoft Exam 70-487—and help demonstrate your real-world mastery of developing Windows Azure and web services. Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Specialist level.

Focus on...

Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers
Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers

Business Model Generation is a handbook for visionaries, game changers, and challengers striving to defy outmoded business models and design tomorrow's enterprises. If your organization needs to adapt to harsh new realities, but you don't yet have a strategy that will get you out in front of your competitors, you need...

Git in Practice
Git in Practice

Summary

Git in Practice is a collection of 66 tested techniques that will optimize the way you and your team manage your development projects. The book begins with a brief reminder of the core version control concepts you need when using Git and moves on to the high-value features you may not have explored...

Successful Program Management: Complexity Theory, Communication, and Leadership
Successful Program Management: Complexity Theory, Communication, and Leadership

Complexity theory is a great, untapped resource in the field of management. Experts agree that it can be a powerful tool for managing complex and virtual programs, but there is little material available to guide program managers on how to use complexity theory to communicate and lead effectively.

Filling this void,
...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Big Data Analytics: Disruptive Technologies for Changing the Game
Big Data Analytics: Disruptive Technologies for Changing the Game

Bringing a practitioner’s view to big data analytics, this work examines the drivers behind big data, postulates a set of use cases, identifies sets of solution components, and recommends various implementation approaches. This work also addresses and thoroughly answers key questions on this...

Getting Started with Red Hat Enterprise Virtualization
Getting Started with Red Hat Enterprise Virtualization

Leverage powerful Red Hat Enterprise Virtualization solutions to build your own IaaS cloud

About This Book

  • Build an agile, secure, and highly scalable virtualization foundation for your enterprise Linux and Windows workloads
  • Explore how Red Hat Enterprise Virtualization positions itself...
Exam Ref 70-410 Installing and Configuring Windows Server 2012 R2 (MCSA)
Exam Ref 70-410 Installing and Configuring Windows Server 2012 R2 (MCSA)

Fully updated for Windows Server 2012 R2! Prepare for Microsoft Exam 70-410 - and help demonstrate your real-world mastery of implementing and configuring core services in Windows Server 2012 R2. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision making acumen...

The Requirements Engineering Handbook (Artech House Technology Management and Professional Development Library)
The Requirements Engineering Handbook (Artech House Technology Management and Professional Development Library)
This book is intended as a concise but thorough ready reference for requirements
analysts (RAs)—those who are assigned to determine the requirements
for planned systems and software, both in computing and engineering.
It is a desk guide/handbook that focuses on how RAs can best perform their
work.

The
...
Result Page: 64 63 62 61 60 59 58 57 56 55 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy