Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

wxPython Recipes: A Problem - Solution Approach
wxPython Recipes: A Problem - Solution Approach

Quickly discover solutions to common problems, learn best practices, and understand everything wxPython has to offer. This book is for anyone wanting to learn more about how to use the wxPython desktop GUI toolkit. It assumes some prior knowledge of Python and a general understanding of wxPython or GUI development, and contains more than 50...

Designing Next Generation Web Projects with CSS3
Designing Next Generation Web Projects with CSS3
In Detail
CSS3 unveils new possibilities for frontend web developers: things that would require JavaScript, such as animation and form validation, or even third party plugins, such as 3D transformations, are now accessible using this technology.

"Designing Next Generation Web Projects with CSS3"
...
Introduction to Finite Element Analysis Using MATLAB® and Abaqus
Introduction to Finite Element Analysis Using MATLAB® and Abaqus

There are some books that target the theory of the finite element, while others focus on the programming side of things. Introduction to Finite Element Analysis Using MATLAB® and Abaqus accomplishes both. This book teaches the first principles of the finite element method. It presents the theory of the finite...

Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results

The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.

Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This...

Einstein in Matrix Form: Exact Derivation of the Theory of Special and General Relativity without Tensors
Einstein in Matrix Form: Exact Derivation of the Theory of Special and General Relativity without Tensors

This book is an introduction to the theories of Special and General Relativity. The target audience are physicists, engineers and applied scientists who are looking for an understandable introduction to the topic - without too much new mathematics. The fundamental equations of Einstein's theory of Special and General Relativity are...

Introduction to Reconfigurable Supercomputing (Synthesis Lectures on Computer Architecture)
Introduction to Reconfigurable Supercomputing (Synthesis Lectures on Computer Architecture)

This book covers technologies, applications, tools, languages, procedures, advantages, and disadvantages of reconfigurable supercomputing using Field Programmable Gate Arrays (FPGAs). The target audience is the community of users of High Performance Computers (HPC) who may benefit from porting their applications into a reconfigurable...

EJB 3.1 Cookbook
EJB 3.1 Cookbook

Enterprise Java Beans enable rapid and simplified development of secure and portable applications based on Java technology. Creating and using EJBs can be challenging and rewarding. Among the challenges are learning the EJB technology itself, learning how to use the development environment you have chosen for EJB development, and the testing...

Fast, Efficient and Predictable Memory Accesses: Optimization Algorithms for Memory Architecture Aware Compilation
Fast, Efficient and Predictable Memory Accesses: Optimization Algorithms for Memory Architecture Aware Compilation
The influence of embedded systems is constantly growing. Increasingly powerful and versatile devices are being developed and put on the market at a fast pace. The number of features is increasing, and so are the constraints on the systems concerning size, performance, energy dissipation and timing predictability. Since most systems today use a...
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Learning UML 2.0
Learning UML 2.0

"Since its original introduction in 1997, the Unified Modeling Language has revolutionized software development. Every integrated software development environment in the world--open-source, standards-based, and proprietary--now supports UML and, more importantly, the model-driven approach to software development. This makes...

Penetration Testing Essentials
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...

Result Page: 57 56 55 54 53 52 51 50 49 48 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy