Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MATLAB Recipes: A Problem-Solution Approach
MATLAB Recipes: A Problem-Solution Approach

Learn from state-of-the-art examples in robotics, motors, detection filters, chemical processes, aircraft, and spacecraft. With this book you will review contemporary MATLAB coding including the latest MATLAB language features and use MATLAB as a software development environment including code organization, GUI development, and...

Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Guide to Wireless Network Security
Guide to Wireless Network Security

With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure,...

Dan Appleman's Developing Activex Components With Visual Basic 5.0: A Guide to the Perplexed
Dan Appleman's Developing Activex Components With Visual Basic 5.0: A Guide to the Perplexed
With the release of version 5, VB programmers can finally create ActiveX controls without resorting to C++. And when the manual can't help, turn to VB master Dan Appleman, who can. In this well-designed guide, you'll find a serious review of all the key technology-from beginning OLE fundamentals to the latest in ActiveX component, ActiveX control,...
OCP Instructors Guide for Oracle DBA Certification: A Study Guide to Advanced Oracle Certified Professional Database Administration Techniques
OCP Instructors Guide for Oracle DBA Certification: A Study Guide to Advanced Oracle Certified Professional Database Administration Techniques

An instructor’s guide for teaching Oracle DBA certification candidates, this book is highly technical and written for Oracle Certified Professional (OCP) DBA instructors who want to ensure that their students successfully pass their Oracle OCP certification exam. Covering those OCP topics that students find the most challenging,...

Alfresco 3 Web Services
Alfresco 3 Web Services

Alfresco 3 is the leading open source enterprise content management system that offers powerful features for interacting with the content in its repository from outside the system. These include the support for the Content Management Interoperability Services (CMIS) implementation, reusable web scripts, and a Web Services API.

This...

Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
A single hype is not enough to change the world. But multiple hypes together can change it as long as they are part of a bigger trend.

This book discusses more than one hyped technology: cloud computing, NoSQL, and HTML5. The technologies in this book combine well with other hyped technologies: functional
...
Professional C++
Professional C++

Essential reading for experienced developers who are determined to master the latest release of C++

Although C++ is often the language of choice from game programming to major commercial software applications, it is also one of the most difficult to master. With this no-nonsense book, you will learn to conquer the latest release of...

The Unknown Component Problem: Theory and Applications
The Unknown Component Problem: Theory and Applications

The Problem of the Unknown Component: Theory and Applications addresses the issue of designing a component that, combined with a known part of a system, conforms to an overall specification. The authors tackle this problem by solving abstract equations over a language. The most general solutions are studied when both synchronous and...

Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214
Welcome to the MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214. This book provides in-depth and detailed information about the major security services in Microsoft Windows 2000 networks, including securing desktops and servers using Group Policy, configuring and managing...
Special Edition Using Microsoft Office 2003, Student-Teacher Edition
Special Edition Using Microsoft Office 2003, Student-Teacher Edition

Microsoft Office Software has been around, in one version or another, for more than a decade. Wethat is, Woody and Edhave been writing about Office since the very beginning. In books, on the Web, and in magazine articles and e-mail newsletters, we've guided lost souls through the Office labyrinth, held Microsoft's feet to the...

unlimited object storage image
Result Page: 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy