Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Adversary Characterization: Auditing the Hacker Mind
Cyber Adversary Characterization: Auditing the Hacker Mind
A book about hacking is a book about everything.
First, the meaning of hacker.

The word “hacker” emerged in an engineering context and became popular
at The Massachusetts Institute of Technology (MIT), among other places, as a
way to talk about any ingenious, creative, or unconventional use of a machine...
IBM InfoSphere Replication Server and Data Event Publisher
IBM InfoSphere Replication Server and Data Event Publisher

Business planning is no longer just about defining goals, analyzing critical issues, and then creating strategies. You must aid business integration by linking changed-data events in DB2 databases on Linux, UNIX, and Windows with EAI solutions , message brokers, data transformation tools, and more. Investing in this book will save you many...

Instant Lift Web Applications
Instant Lift Web Applications

Get to know the Lift Web Framework quickly and efficiently using practical, hands-on recipes

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
  • Develop your own Lift web applications, find practical examples for many common use cases.
  • ...
The Photoshop Book for Digital Photographers
The Photoshop Book for Digital Photographers
Some people make their living with a camera, and for these people the maturation of digital photo technology means a significant shift in their trade. The Photoshop Book for Digital Photographers is for people who are already adept with a camera, and pretty much up to speed on the peculiarities of digital photography, too. The book teaches...
HBase Design Patterns
HBase Design Patterns

Design and implement successful patterns to develop scalable applications with HBase

About This Book

  • Design HBase schemas for the most demanding functional and scalability requirements
  • Optimize HBase's handling of single entities, time series, large files, and complex events by...
Practical PHP and MySQL(R): Building Eight Dynamic Web Applications (Negus Live Linux Series)
Practical PHP and MySQL(R): Building Eight Dynamic Web Applications (Negus Live Linux Series)
Everyone is going nuts about the Web. Ever since we started getting creaky old modems installed in our homes and businesses, the Web has become an increasingly dominant part of our lives. With it we explore, shop, diagnose, entertain, amuse, communicate, collaborate, and more. The Web is no longer a novelty item that the few use to stretch their...
Pentaho Analytics for MongoDB
Pentaho Analytics for MongoDB

Together, Pentaho and MonoDB can provide the complete solution for storing, processing, and visualizing data. This user-friendly guide will soon have you configuring Pentaho Business Analytics to talk to MongoDB for great results.

Overview

  • This is a step-by-step guide that will have you quickly creating...
Computers: Systems, Terms and Acronyms, 14th Edition
Computers: Systems, Terms and Acronyms, 14th Edition

Computers: Systems, Terms and Acronyms is THE technical reference for non-technical people who need to understand Information Technology. The book contains narrative coverage of IT concepts and systems written in plain English for non-technical people. It also contains more than 3,700 definitions of generic technical terms and acronyms,...

Pro CSS and HTML Design Patterns
Pro CSS and HTML Design Patterns
This is a solutions book for styling HTML 4.01 and XHTML 1.1 with CSS 2.1. It contains more than 350 design patterns you can put to use right away. Each design pattern is modular and customizable, and you can combine patterns to create an unlimited number of designs.

Each design pattern has been thoroughly tested and proven to work in
...
Going to Extremes: How Like Minds Unite and Divide
Going to Extremes: How Like Minds Unite and Divide
Why do people become extremists? What makes people become so dismissive of opposing views? Why is political and cultural polarization so pervasive in America? Why do groups of teenagers, investors, and corporations take unnecessary risks? What leads groups to engage in such destructive acts as terrorism and ethic cleansing?

In
...
Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Ecdysone: Structures and Functions
Ecdysone: Structures and Functions

Ecdysone is the steroidal prohormone of the major insect moulting hormone 20-hydroxyecdysone. It groups with its homologues the steroidal molting hormones in arthropods, but they also occur in other phyla where they can play different roles. Besides ecdysteroids appear in many plants mostly as protection agents (toxins or antifeedants) against...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy