Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

I. M. Wright's "Hard Code": A Decade of Hard-Won Lessons from Microsoft (Best Practices)
I. M. Wright's "Hard Code": A Decade of Hard-Won Lessons from Microsoft (Best Practices)

Get the brutal truth about coding, testing, and project management—from a Microsoft insider who tells it like it is. I. M. Wright's deliberately provocative column "Hard Code" has been sparking debate amongst thousands of engineers at Microsoft for years. And now (despite our better instincts), we're making...

Metaprogramming Elixir: Write Less Code, Get More Done (and Have Fun!)
Metaprogramming Elixir: Write Less Code, Get More Done (and Have Fun!)

Write code that writes code with Elixir macros. Macros make metaprogramming possible and define the language itself. In this book, you'll learn how to use macros to extend the language with fast, maintainable code and share functionality in ways you never thought possible. You'll discover how to extend Elixir with your own first-class...

JMP 12 Specialized Models
JMP 12 Specialized Models

JMP 12 Specialized Models provides details about modeling techniques such as partitioning, neural networks, nonlinear regression, and time series analysis. Topics include the Gaussian platform, which is useful in analyzing computer simulation experiments. The book also covers the Response Screening platform, which is useful in testing the...

Oracle 12c: SQL
Oracle 12c: SQL

Now you can master the latest version of the fundamental SQL language used in all relational databases today with ORACLE 12C: SQL, 3E. Much more than a study guide, this edition helps you transform a basic knowledge of databases into proficiency with the latest SQL and Oracle concepts and techniques. You learn to use Oracle 12c SQL most...

Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)
Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)

Based on the author’s introductory course at the University of Oregon, Explorations in Computing: An Introduction to Computer Science focuses on the fundamental idea of computation and offers insight into how computation is used to solve a variety of interesting and important real-world problems. Taking an...

Solaris 9 Network Administration Exam Cram 2 (Exam Cram CX-310-044)
Solaris 9 Network Administration Exam Cram 2 (Exam Cram CX-310-044)
This cram sheet contains the distilled, key facts about the Solaris 9 Network Administrator exam. Review this information just before you enter the testing center, paying special attention to those areas where you feel that you need the most review. You can transfer any of these facts from your head onto a blank sheet of paper immediately before...
JUnit in Action
JUnit in Action
A guide to unit testing Java applications (including J2EE applications) using the JUnit framework and its extensions, this book provides techniques for solving real-world problems such as unit testing legacy applications, writing real tests for real objects, automating tests, testing in isolation, and unit testing J2EE and database...
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Oracle PL/SQL Best Practices
Oracle PL/SQL Best Practices
In this compact book, Steven Feuerstein, widely recognized as one of the world's leading experts on the Oracle PL/SQL language, distills his many years of programming, teaching, and writing about PL/SQL into a set of best practices-recommendations for developing successful applications. Covering the latest Oracle release, Oracle Database 11g,...
The Red Gate Guide to SQL Server Team-based Development
The Red Gate Guide to SQL Server Team-based Development

Only small projects, relevant to very few people, are built by the sweat and toil of a lone developer. Larger projects, affecting whole organizations, will invariably require a team of people to design and develop the application and its storage layer, or database.

In some cases, this will mean some developers and one or two DBAs,...

Nonparametric Tests for Censored Data
Nonparametric Tests for Censored Data

This book concerns testing hypotheses in non-parametric models. Generalizations of many non-parametric tests to the case of censored and truncated data are considered. Most of the test results are proved and real applications are illustrated using examples. Theories and exercises are provided. The incorrect use of many tests applying most...

Result Page: 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy