Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Beginning Visual C# 2012 Programming
Beginning Visual C# 2012 Programming

Step-by-step beginner's guide to Visual C# 2012 Written for novice programmers who want to learn programming with C# and the .NET framework, this book offers programming basics such as variables, flow control, and object oriented programming. It then moves into web and Windows programming and data access (databases and XML). The authors...

Unity Multiplayer Games
Unity Multiplayer Games

Take your gaming development skills into the online multiplayer arena by harnessing the power of Unity 4 or 3. This is not a dry tutorial - it uses exciting examples and an enthusiastic approach to bring it all to life.

Overview

  • Create a variety of multiplayer games and apps in the Unity 4 game engine,...
Python Programming Fundamentals (Undergraduate Topics in Computer Science)
Python Programming Fundamentals (Undergraduate Topics in Computer Science)

This easy-to-follow and classroom-tested textbook guides the reader through the fundamentals of programming with Python, an accessible language which can be learned incrementally. 

Features: incudes numerous examples and practice exercises throughout the text, with additional exercises, solutions and review questions at the...

Pascal Plus Data Structures, Algorithms, and Advanced Programming
Pascal Plus Data Structures, Algorithms, and Advanced Programming
Until recently there has not been much consensus among educators on what formal education is necessary for a computer professional. It has always been considered essential to have a great deal of mathematical knowledge, as \vell as an understanding of computer hardware. Software education, however, often consisted of the teaching...
Java EE 8 and Angular: A practical guide to building modern single-page applications with Angular and Java EE
Java EE 8 and Angular: A practical guide to building modern single-page applications with Angular and Java EE

Learn how to build high-performing enterprise applications using Java EE powered by Angular at the frontend

Key Features

  • Leverage Java EE 8 features to build robust back end for your enterprise applications
  • Use Angular to build a single page frontend and combine it with...
Microsoft ASP.NET Web Matrix Starter Kit
Microsoft ASP.NET Web Matrix Starter Kit

Have you ever gone to a great Web site and said to yourself, “I sure wish I could do that?” This hands-on book shows you exactly how. It’s a task-oriented, no-frills introduction, specifically for programming novices, to the cool world of programming the Web by using the power of Microsoft ASP.NET Web Matrix—an...

Web Bloopers, First Edition : 60 Common Web Design Mistakes, and How to Avoid Them
Web Bloopers, First Edition : 60 Common Web Design Mistakes, and How to Avoid Them

Will your website pass the test? Or will site visitors be gnashing their teeth and shaking their fists? Will any customers ever come back to your site? Save yourself the embarrassment of being caught with your Web bloopers showing. Read this book and find out now if your website commits any heinous bloopers.

This book is not just about...

Photoshop Elements 4 For Dummies (Computer/Tech)
Photoshop Elements 4 For Dummies (Computer/Tech)
Whether you're a hobbyist or a pro, look what you can do with Elements 4!

Photoshop Elements is all grown up — a powerful program that's easy to use and gives professional results. This book's step-by-step instructions and full-color examples help you take creative control of Photoshop Elements' tools. From sharpening...

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Dynamic HTML: The Definitive Reference (2nd Edition)
Dynamic HTML: The Definitive Reference (2nd Edition)
I am going to admit a selfish motive for writing this book and, more recently, updating it to the second edition: I needed the finished product for my own consulting and development work. After struggling in the early Version 4 browser days with tangled online references and monstrous printed versions of Netscape, Microsoft, and World Wide Web...
Spring Live
Spring Live
This book is written for Java developers familiar with web frameworks. Its main purpose is for Java developers to learn Spring and evaluate it against other frameworks. One of my hopes is to compare Spring to other web frameworks, or at least show how it can be integrated with other frameworks (i.e. Struts, WebWork, maybe even Tapestry down the...
unlimited object storage image
Result Page: 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy