Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Stopping Spyware
Stopping Spyware
Stop spyware in its tracks! Spyware infects the vast majority of home computers today. After it's on your machine, it can be used to access your social security number, track every website you visit, and take control of your computer away from you. If you work for a large company, odds are your company has purchased anti-spyware protection for...
Building Web Applications with .NET Core 2.1 and JavaScript: Leveraging Modern JavaScript Frameworks
Building Web Applications with .NET Core 2.1 and JavaScript: Leveraging Modern JavaScript Frameworks

Roll up your sleeves and jump into building web applications using .NET Core 2.1 and the most popular JavaScript frameworks.

You will start by building a data access layer using Entity Framework Core, a RESTful service using ASP.NET Core, and then you will build a web application following the MVC pattern, also using...

Complete Vue.js 2 Web Development: Practical guide to building end-to-end web development solutions with Vue.js 2
Complete Vue.js 2 Web Development: Practical guide to building end-to-end web development solutions with Vue.js 2

Become a pro in creating modern interactive web applications using this JavaScript framework

Key Features

  • Explore the exciting features of Vue.js 2 through interesting examples and practical recipes
  • Craft highly modular applications using design patterns and the component...
Software Configuration Management Strategies and IBM® Rational® ClearCase® Second Edition A Practical Introduction
Software Configuration Management Strategies and IBM® Rational® ClearCase® Second Edition A Practical Introduction
"I wrote that the first edition of this book "communicates much of the experience, wisdom, and insight that was acquired along the way to discovering what SCM best practices are and how to implement/deploy them." The second edition is full of even more practical experience! It not only refines and expands upon earlier strategies...
File System Forensic Analysis
File System Forensic Analysis
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier...
Java Regular Expressions: Taming the java.util.regex Engine
Java Regular Expressions: Taming the java.util.regex Engine

Java has always been an excellent language for working with objects. But Java’s text manipulation mechanisms have always been limited, compared to languages like AWK and Perl. On the flip side, a new regular expressions package in Java 2 Standard Edition (J2SE) brings hope to the Java text mechanisms. This package provides you...

RESTful Rails Development: Building Open Applications and Services
RESTful Rails Development: Building Open Applications and Services

The Web is slowly but surely changing from a model in which a human reader browses content on web pages to a model in which services and clients (not necessarily humans) exchange information. And because of this, author Silvia Puglisi explains, it makes more sense to build platforms instead of just products or applications. Platforms...

MCSD Analyzing Requirements and Defining .NET Solutions Architectures Study Guide (Exam 70-300 (Certification Press)
MCSD Analyzing Requirements and Defining .NET Solutions Architectures Study Guide (Exam 70-300 (Certification Press)

Based on 300,000+ hours of IT training experience, this Study Guide provides 100% coverage of all objectives for exam 70-310. Coverage includes the .NET Framework, Visual Studio .NET, creating physical designs, developing solution concepts, and more.

  • 100% Complete Coverage—All official test...
XML Data Management: Native XML and XML-Enabled Database Systems
XML Data Management: Native XML and XML-Enabled Database Systems

The past few years have seen a dramatic increase in the popularity and adoption of XML, the eXtensible Markup Language. This explosive growth is driven by its ability to provide a standardized, extensible means of including semantic information within documents describing semi-structured data. This makes it possible to...

Performance Analysis for Java Websites
Performance Analysis for Java Websites

How well a Web site performs while receiving heavy user traffic is an essential factor in an organization's overall success. How can you be sure your site will hold up under pressure?

Performance Analysis for Java(TM) Web Sites is an information-packed guide to...

Microsoft Windows Media Resource Kit
Microsoft Windows Media Resource Kit

Broadcast live events or stream content on demand with expertise from those who know the technology best—the Microsoft Windows Media Team. This official Resource Kit packs the technical insights and tools you need to capture, encode, distribute, and play back digital video and audio using the Windows Media 9 Series platform....

Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition
Network Analysis Using Wireshark 2 Cookbook: Practical recipes to analyze and secure your network using Wireshark 2, 2nd Edition

Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2

Key Features

  • Place Wireshark 2 in your network and configure it for effective network analysis
  • Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease
  • ...
unlimited object storage image
Result Page: 713 712 711 710 709 708 707 706 705 704 703 702 701 700 699 698 697 696 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy