Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang
Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang

Explore the fundamentals of systems programming starting from kernel API and filesystem to network programming and process communications

Key Features

  • Learn how to write Unix and Linux system code in Golang v1.12
  • Perform inter-process communication using pipes, message...
An Introduction to IMS(TM) : Your Complete Guide to IBM's Information Management System
An Introduction to IMS(TM) : Your Complete Guide to IBM's Information Management System

The Only Up-to-the-Minute Guide to IMS Version 9--Straight from IBM IMS Experts

  • Introduces IMS, one of the world's premiere software products
  • Thoroughly covers key IMS functions, from security to Java support
  • For both new and experienced IMS...
tmux: Productive Mouse-Free Development
tmux: Productive Mouse-Free Development

Your mouse is slowing you down. The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. Learn how to customize, script, and leverage tmux's unique abilities and keep your fingers on...

Linux Shell Scripting Essentials
Linux Shell Scripting Essentials

Learn shell scripting to solve complex shell-related problems and to efficiently automate your day-to-day tasks

About This Book

  • Familiarize yourself with the terminal by learning about powerful shell features
  • Automate tasks by writing shell scripts for repetitive work
  • ...
Practical LPIC-1 Linux Certification Study Guide
Practical LPIC-1 Linux Certification Study Guide
This book is your complete guide to studying for the Linux Professional Institute's Server Professional (LPIC-1) certification. Every concept, principle, process, and resource that might make an appearance on the exam is fully represented. You will understand every concept by rolling up your sleeves, opening up a terminal,...
Audio Signal Processing for Next-Generation Multimedia Communication Systems
Audio Signal Processing for Next-Generation Multimedia Communication Systems
This book has its origins in the Multimedia Communications Research Center at Bell Laboratories. It will likely be the last thing coming from this Center, since it no longer exists. This book reflects our vision on next-generation multimedia communication systems, shared by many researchers who worked with us at a time in the last several years in...
Getting Started with MariaDB
Getting Started with MariaDB

Learn how to use MariaDB to store your data easily and hassle-free

Overview

  • A step-by-step guide to installing and configuring MariaDB
  • Includes real-world examples that help you learn how to store and maintain data on MariaDB
  • Written by someone who has been involved with the...
Wireless Digital Communications: Design & Theory
Wireless Digital Communications: Design & Theory

Digital transmissions are rapidly supplanting analog transmissions in both amateur and commercial radio communications. Digital radio transmissions offer many inherent advantages. Digital techniques allow virtually noise-free transmission of data, messages, control commands, sounds and images to be achieved. Digital transmissions allow...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
DNS and BIND
DNS and BIND
You may not know much about the Domain Name System − yet − but whenever you use the Internet, you
use DNS. Every time you send electronic mail or surf the World Wide Web, you rely on the Domain Name
System.

You see, while you, as a human being, prefer to remember the names of computers, computers like to address...
The IMS : IP Multimedia Concepts and Services in  the Mobile Domain
The IMS : IP Multimedia Concepts and Services in the Mobile Domain
We have telephony to talk to each other, messaging to dispatch mail or instant messages, browsing to read published content and search engines to locate content sites. However, current mobile networks do not provide the possibility for one application rich terminal to communicate with another in a peer-to-peer session beyond voice calls. Mobile...
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy