Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

The Coming Robot Revolution: Expectations and Fears About Emerging Intelligent, Humanlike Machines
The Coming Robot Revolution: Expectations and Fears About Emerging Intelligent, Humanlike Machines

Making a robot that looks and behaves like a human being has been the subject of many popular science fiction movies and books. Although the development of such a robot faces many challenges, the making of a virtual human has long been potentially possible. With recent advances in various key technologies related to hardware and...

Microsoft System Center Reporting Cookbook
Microsoft System Center Reporting Cookbook

Over 40 practical recipes to help you plan, create, and manage reports efficiently for all components of Microsoft System Center

About This Book

  • Create and deliver high value reports to show the value of your System Center investment
  • Gain access to real world solutions in the art and...
Mastering Windows Server 2016 Hyper-V
Mastering Windows Server 2016 Hyper-V

Build a seamless, flexible, full-service datacenter solution

Microsoft Windows Server 2016 Hyper-V is the IT administrator's guide to this rising datacenter solution. Hyper-V has already surpassed VMWare in datacenter management, identity service for multiple devices, and more; this book shows you how to harness...

Delphi in a Nutshell
Delphi in a Nutshell

Aimed at the working Delphi developer, Delphi in a Nutshell is an effective desktop reference to this popular programming tool. Besides listing all core classes and methods, this book also provides a host of expert dos and don'ts for mastering the newest features in Delphi's Object Pascal.

The heart of this book is...

Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
Image Processing in C: Analyzing and Enhancing Digital Images with 3.5 Disk
Image Processing in C: Analyzing and Enhancing Digital Images with 3.5 Disk
This book is a tutorial on image processing. Each chapter explains basic concepts with words and gures, shows image processing results with photographs, and implements the operations in C. Information herein comes from articles published in The C/C++ Users Journal from 1990 through 1998 and from the first edition of this book published in 1994....
OS X and iOS Kernel Programming
OS X and iOS Kernel Programming
Kernel development can be a daunting task and is very different from programming traditional user applications. The kernel environment is more volatile and complex. Extraordinary care must be taken to ensure that kernel code is free of bugs because any issue may have serious consequences to the stability, security, and performance...
Managing the Design Process-Concept Development: An Essential Manual for the Working Designer
Managing the Design Process-Concept Development: An Essential Manual for the Working Designer
Every aspect of business is impacted by design—from the products or services a company provides, to the various forms of communications that express these products and services, to the many environments, physical or virtual, where customers interact with these offerings. Graphic design can captivate, persuade, motivate, and delight....
GNS3 Network Simulation Guide
GNS3 Network Simulation Guide

Acquire a comprehensive knowledge of the GNS3 graphical network simulator, using it to prototype your network without the need for physical routers

Overview

  • Develop your knowledge for Cisco certification (CCNA, CCNP, CCIE), using GNS3
  • Install GNS3 successfully on Windows, Linux, or OS...
Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Microsoft XNA Game Studio Creator's Guide, Second Edition
Microsoft XNA Game Studio Creator's Guide, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Bring your PC, Zune, and Xbox gaming visions to life with Microsoft XNA Game Studio

Develop...

unlimited object storage image
Result Page: 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy