Home | Amazing | Today | Tags | Publishers | Years | Search 
Learning Pentesting for Android Devices
Learning Pentesting for Android Devices

Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the...

SDN: Software Defined Networks
SDN: Software Defined Networks

Explore the emerging definitions, protocols, and standards for SDN—software-defined, software-driven, programmable networks—with this comprehensive guide. Two senior network engineers show you what’s required for building networks that use software for bi-directional communication between applications and the...

Smart Home Automation with Linux and Raspberry Pi
Smart Home Automation with Linux and Raspberry Pi

Smart Home Automation with Linux and Raspberry Pi shows you how to automate your lights, curtains, music, and more, and control everything via a laptop or mobile phone.

You'll learn how to use Linux, including Linux on Raspberry Pi, to control appliances and everything from kettles to curtains, including how to hack...

Bandit Algorithms for Website Optimization
Bandit Algorithms for Website Optimization

When looking for ways to improve your website, how do you decide which changes to make? And which changes to keep? This concise book shows you how to use Multiarmed Bandit algorithms to measure the real-world value of any modifications you make to your site. Author John Myles White shows you how this powerful class of algorithms can...

Building Internet Firewalls
Building Internet Firewalls

More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images.Everyone is jumping on the Internet bandwagon. Once a...

Build a Profitable Online Business: The No-Nonsense Guide (Expert's Voice in E-Commerce)
Build a Profitable Online Business: The No-Nonsense Guide (Expert's Voice in E-Commerce)

Build a Profitable Online Business: The No Nonsense Guide is a highly condensed step-by-step guide on how to build and run profitable websites.

Serial web entrepreneur Mikael Olsson gives you in a nutshell all the tools, tips, and savvy you’ll need to create and operate online businesses that will...

Turn Clicks Into Customers: Proven Marketing Techniques for Converting Online Traffic into Revenue
Turn Clicks Into Customers: Proven Marketing Techniques for Converting Online Traffic into Revenue

Turn online visitors into paying customers!

You’ve gone through all steps of developing a powerful business presence on the Web-—but it’s only the first step. Now, you have to make sure your visitors hit the “Purchase” button . . . before they start clicking through to your...

Soft Landing: Airline Industry Strategy, Service, and Safety
Soft Landing: Airline Industry Strategy, Service, and Safety

Soft Landing: Airline Industry Strategy, Service, and Safety covers the immediate past, present, and future of the airline industry and its effects on consumers and the economy. 

Aviation receives a disproportionate amount of news coverage in the popular press—not to mention chatter at cocktail parties and...

Using and Managing PPP
Using and Managing PPP

In the last decade, the Internet has grown from a network that connected a few universities and research centers to a network that links many businesses and households all over the country. That expansion occurred for many reasons, but the technological advance that facilitated this growth was an obscure protocol called PPP.PPP...

Inbound Marketing For Dummies
Inbound Marketing For Dummies

Don't chase business—bring new customers to you!

Outdated sales tactics have you chasing leads and fishing for new business. In today's competitive world, nobody has time for that! Inbound Marketing For Dummies is a one-stop-shop for everything you need to know about inbound marketing techniques that...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Hyper-V Replica Essentials
Hyper-V Replica Essentials

For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.

Overview

  • A practical step-by-step guide that goes beyond theory and...
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy