Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design Patterns in C#: A Hands-on Guide with Real-World Examples
Design Patterns in C#: A Hands-on Guide with Real-World Examples
Get hands-on experience with each Gang of Four design pattern using C#. For each of the patterns, you’ll see at least one real-world scenario, a coding example, and a complete implementation including output.

In the first part of Design Patterns in C#, you will cover the 23 Gang of Four (GoF) design...
Beginning Excel Services (Programmer to Programmer)
Beginning Excel Services (Programmer to Programmer)
Given the prominent role Excel plays in today's companies, the need for users to better manage, distribute, and incorporate spreadsheets in larger applications is greater than ever. Written by Microsoft's lead developers of Excel Services, this book shares their insights into the benefits and usage of Excel's new server technology so that you can...
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering,...
Persistence in the Enterprise: A Guide to Persistence Technologies (developerWorks Series)
Persistence in the Enterprise: A Guide to Persistence Technologies (developerWorks Series)

The Definitive Guide to Today's Leading Persistence Technologies

Persistence in the Enterprise is a unique, up-to-date, and objective guide to building the persistence layers of enterprise applications. Drawing on their extensive experience, five leading IBM® Web...

Penetration Tester's Open Source Toolkit
Penetration Tester's Open Source Toolkit
This is the first fully integrated Penetration Testing book and bootable Linux CD containing the Auditor Security Collection which includes over 300 of the most effective and commonly used open source attack and penetration testing tools. This powerful tool kit and authoritative reference is written by the security industry's foremost...
Android Wireless Application Development (2nd Edition) (Developer's Library)
Android Wireless Application Development (2nd Edition) (Developer's Library)

Android™ Wireless Application Development  Second Edition

 

Lauren Darcey

Shane Conder

 

The start-to-finish guide to Android application...

The Debugger's Handbook
The Debugger's Handbook

Focused on the best practices for writing code as well as on the methods to perform more effective debugging, The Debugger's Handbook promotes a natural debugging approach to writing code. The author begins by examining and concretely defining just what a bug is, what circumstances are more prone to producing bugs, and how to avoid them from the...

iOS Code Testing: Test-Driven Development and Behavior-Driven Development with Swift
iOS Code Testing: Test-Driven Development and Behavior-Driven Development with Swift
Put into motion practical examples to master Test-Driven Development (TDD) and acceptance testing in Swift.

This book uses a pragmatic approach to writing well-tested code and provides techniques that can be used to retrofit tests to legacy code bases. You'll be introduced to basic principles of TDD, such as
...
Nmap 6: Network exploration and security auditing Cookbook
Nmap 6: Network exploration and security auditing Cookbook

Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it's a comprehensive guide to penetration testing and network monitoring. Security in depth.

Overview

  • Master the power of Nmap 6
  • Learn how the...
Guide to the IET Wiring Regulations: IET Wiring Regulations (BS 7671:2008 incorporating Amendment No 1:2011)
Guide to the IET Wiring Regulations: IET Wiring Regulations (BS 7671:2008 incorporating Amendment No 1:2011)

This authoritative, best-selling guide has been extensively updated with the new technical requirements of the IET Wiring Regulations (BS 7671: 2008) Amendment No. 1:2011, also known as the IET Wiring Regulations 17th Edition. With clear description, it provides a practical interpretation of the amended regulations –...

Working with Microsoft® Visual Studio® 2005 Team System
Working with Microsoft® Visual Studio® 2005 Team System

Learn how to collaborate and streamline your development process using Visual Studio Team System.

This overview of Microsoft Visual Studio 2005 Team System offers practical information and role-based guidance to get key members of your software development team working together. With insights from the Visual Studio...

Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy