Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

T-SQL Fundamentals (3rd Edition)
T-SQL Fundamentals (3rd Edition)

Effectively query and modify data using Transact-SQL
Master T-SQL fundamentals and write robust code for Microsoft SQL Server and Azure SQL Database. Itzik Ben-Gan explains key T-SQL concepts and helps you apply your knowledge with hands-on exercises. The book first introduces
...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

System Architecture with XML
System Architecture with XML
"The whole world is talking XML, and the ramifications of its universal adoption are only beginning to surface. Whole business models will be affected by it; whole new business interests are being pursued because of it. The software industry itself will be rocked by it more than it cares to admit. This is so because XML brings us into the...
Data Algorithms: Recipes for Scaling Up with Hadoop and Spark
Data Algorithms: Recipes for Scaling Up with Hadoop and Spark

If you are ready to dive into the MapReduce framework for processing large datasets, this practical book takes you step by step through the algorithms and tools you need to build distributed MapReduce applications with Apache Hadoop or Apache Spark. Each chapter provides a recipe for solving a massive computational problem, such as...

Numerical Polynomial Algebra
Numerical Polynomial Algebra
This first book on the numerical analysis of polynomial systems is a stepping stone at the interface of symbolic computation and numerical computation. Bernard Sturmfels, Department of Mathematics, University of Berkeley

I am not familiar with any books that do such a careful job of combining numerical analysis with the algebra of
...
Head First SQL: Your Brain on SQL -- A Learner's Guide
Head First SQL: Your Brain on SQL -- A Learner's Guide
Is your data dragging you down? Are your tables all tangled up? Well we've got the tools to teach you just how to wrangle your databases into submission. Using the latest research in neurobiology, cognitive science, and learning theory to craft a multi-sensory SQL learning experience, Head First SQL has a visually rich format designed for...
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic...
Expert One-on-One Oracle
Expert One-on-One Oracle
Tom Kyte is of a rare breed. To begin, he's technically expert in his subject (administration of and development of applications for Oracle database management systems). What's more (and what distinguishes him from the ranks of the super-competent), he is both able and willing to share his considerable store of wisdom with Oracle users via...
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Mastering Bitcoin: Unlocking Digital Cryptocurrencies

Mastering Bitcoin is essential reading for everyone interested in learning about bitcoin basics, the technical operation of bitcoin, or if you're building the next great bitcoin killer app or business. From using a bitcoin wallet to buy a cup of coffee, to running a bitcoin marketplace with hundreds of thousands of transactions, or...

Data Access Patterns: Database Interactions in Object-Oriented Applications
Data Access Patterns: Database Interactions in Object-Oriented Applications

Efficient, high-quality data access code is crucial to the performance and usability of virtually any enterprise application-and there's no better way to improve an existing system than to optimize its data access code. Regardless of database engine, platform, language, or application, developers repeatedly encounter the same...

RESTful Web Services Cookbook: Solutions for Improving Scalability and Simplicity
RESTful Web Services Cookbook: Solutions for Improving Scalability and Simplicity

While the REST design philosophy has captured the imagination of web and enterprise developers alike, using this approach to develop real web services is no picnic. This cookbook includes more than 100 recipes to help you take advantage of REST, HTTP, and the infrastructure of the Web. You'll learn ways to design RESTful web...

Result Page: 40 39 38 37 36 35 34 33 32 31 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy