Home | Amazing | Today | Tags | Publishers | Years | Search 
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

SQL Primer: An Accelerated Introduction to SQL Basics
SQL Primer: An Accelerated Introduction to SQL Basics

Modern society is driven by data. Whether it is at a personal level, like a notebook containing scribbled notes; or at a countrywide level like Census data, it has permeated all our workflows. There is always a growing need to efficiently store and organize it so that meaningful information can be extracted out of raw data.

A
...

Next.js Quick Start Guide: Server-side rendering done right
Next.js Quick Start Guide: Server-side rendering done right

Create, build and deploy universal JavaScript applications using Next.js

Key Features

  • Work with the entire tool-chain for developing universal Javascript applications with Next.js
  • A straightforward guide to implementing server-side rendering
  • Use Next.js to...
Network Programming with Rust: Build fast and resilient network servers and clients by leveraging Rust's memory-safety and concurrency features
Network Programming with Rust: Build fast and resilient network servers and clients by leveraging Rust's memory-safety and concurrency features
Learn to write servers and network clients using Rust
Key Features
  • Build a solid foundation in Rust while also mastering important network programming details
  • Leverage the power of a number of available libraries to perform network operations in Rust
  • Develop a fully...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Python Interviews: Discussions with Python Experts
Python Interviews: Discussions with Python Experts

Mike Driscoll takes you on a journey talking to a hall-of-fame list of truly remarkable Python experts. You'll be inspired every time by their passion for the Python language, as they share with you their experiences, contributions, and careers in Python.

Key Features

  • Hear from these...
Voice User Interface Design: Moving from GUI to Mixed Modal Interaction
Voice User Interface Design: Moving from GUI to Mixed Modal Interaction
This is 2019. The year becomes significant when we start talking technological advancements and their effects as we move forward. Every year, we see something new, something that has the potential to change technology forever. But as American fiction author William Gibson puts it aptly, “The future is already here; it is...
Just Eat It: How intuitive eating can help you get your shit together around food
Just Eat It: How intuitive eating can help you get your shit together around food
Review: Truly life-changing . It's about trusting your appetite - something that shouldn't be radical, yet something many women (including myself) see as a hugely daunting task. (Dolly Alderton); Laura is a passionate and intelligent voice of new thinking, a fire starter of the revolution in how we think about food, eating and our...
VACCINE SCIENCE REVISITED: Are Childhood Immunizations As Safe As Claimed? (The Underground Knowledge Series)
VACCINE SCIENCE REVISITED: Are Childhood Immunizations As Safe As Claimed? (The Underground Knowledge Series)
An unbiased, neutral, fact-based investigation that simply allows the science to do the talking on childhood vaccinations. Written by father and son investigative journalism/research team Lance & James Morcan, with a foreword by medical laboratory scientist Elísabet Norris, VACCINE SCIENCE REVISITED is possibly the most...
Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Instagram, GitHub, and More
Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Instagram, GitHub, and More

Mine the rich data tucked away in popular social websites such as Twitter, Facebook, LinkedIn, and Instagram. With the third edition of this popular guide, data scientists, analysts, and programmers will learn how to glean insights from social media—including who’s connecting with whom, what they’re...

Let Them See You: The Guide for Leveraging Your Diversity at Work
Let Them See You: The Guide for Leveraging Your Diversity at Work
The guide to getting hired, being promoted, and thriving professionally for the 40 million people of color in the workplace—from the CEO and cofounder of Jopwell, the leading career advancement platform for Black, Latinx, and Native American students and professionals.
 
Let Them See You is a
...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy