Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems
Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems
Shell scripts are an efficient way to interact with your machine and manage your files and system operations. With just a few lines of code, your computer will do exactly what you want it to do. But you can also use shell scripts for many other essential (and not-so-essential) tasks.

This second edition of Wicked Cool
...
Networking For Dummies (Computer/Tech)
Networking For Dummies (Computer/Tech)
The #1 bestselling beginner's guide to computer networking—now in a new edition

Need networking know-how, but don't know where to turn? Run—don't walk—to the no-nonsense networking guidance offered in this friendly guide! Whether you're a networking administrator or an everyday computer user...

Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Polymorphism in Java: Methods and polymorphic algorithms applied to computer games
Polymorphism in Java: Methods and polymorphic algorithms applied to computer games
The creation of polymorphic algorithms is a necessary skill for programmers who intend to write reusable code. This book stands out for teaching programming based on polymorphism. Abundant examples in Java code and illustrative graphics of the main ideas related to the topic: Polymorphism in Java. The book "Polymorphism in Java" aims...
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Are you interested in learning about how to hack systems?

Do you want to learn how to protect yourself from being hacked?

Do you wish to learn the art of ethical hacking?

Do you want to know the secrets techniques that genius hackers use?

Do you want to learn how to protect yourself...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Practical LPIC-1 Linux Certification Study Guide
Practical LPIC-1 Linux Certification Study Guide
This book is your complete guide to studying for the Linux Professional Institute's Server Professional (LPIC-1) certification. Every concept, principle, process, and resource that might make an appearance on the exam is fully represented. You will understand every concept by rolling up your sleeves, opening up a terminal,...
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll...
A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Agile Model-Based Development Using UML-RSDS
Agile Model-Based Development Using UML-RSDS

This book describes the concepts and application of model-based development (MBD), model transformations, and Agile MBD to a wide range of software systems. It covers systems requirements engineering, system specification and design, verification, reuse, and system composition in the context of Agile MBD. Examples of applications in...

The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)
The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)

The “Bible” for Rails Development: Fully Updated for Rails 5

 

“When I read The Rails Way for the first time, I felt like I truly understood Rails for the first time.”

...
Result Page: 771 770 769 768 767 766 765 764 763 762 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy