Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ASP.NET Web API: Build RESTful web applications and services on the .NET framework
ASP.NET Web API: Build RESTful web applications and services on the .NET framework

An opportunity for ASP.NET web developers to advance their knowledge with a practical course, designed from the ground up, to help you investigate REST-based services with C# 5. An essential, real-world tutorial.

  • Clear and concise guide to the ASP.NET Web API with plentiful code examples
  • Learn about the...
Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali: Practical Penetration Testing Techniques

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live...

The Art of Unit Testing: with examples in C#
The Art of Unit Testing: with examples in C#

Summary

The Art of Unit Testing, Second Edition guides you step by step from writing your first simple tests to developing robust test sets that are maintainable, readable, and trustworthy. You'll master the foundational ideas and quickly move to high-value subjects like mocks, stubs, and isolation,...

Learning SQL Server Reporting Services 2012
Learning SQL Server Reporting Services 2012

For a newcomer to SQL Reporting Services 2012, things can seem a bit daunting, but this book will ease your path to becoming an expert. Clear instructions and screenshots will have you generating reports in no time.

Overview

  • Build applications using the latest Microsoft technologies: SSIS 2012, SSDT, WPF,...
Quantum Walks and Search Algorithms (Quantum Science and Technology)
Quantum Walks and Search Algorithms (Quantum Science and Technology)

This book addresses an interesting area of quantum computation called quantum walks, which play an important role in building quantum algorithms, in particular search algorithms. Quantum walks are the quantum analogue of classical random walks.

It is known that quantum computers have great power for searching unsorted databases....

Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

Microsoft SQL Server 2012 Internals (Developer Reference)
Microsoft SQL Server 2012 Internals (Developer Reference)

Dive deep inside the architecture of SQL Server 2012

Explore the core engine of Microsoft SQL Server 2012—and put that practical knowledge to work. Led by a team of SQL Server experts, you’ll learn the skills you need to exploit key architectural features. Go behind the scenes to understand internal operations...

Git: Version control for everyone
Git: Version control for everyone

Git – is free software which enables you to maintain different versions of single or multiple directory contents, and allows you to switch back and forth between them at any given point of time. It also allows multiple people to work on the same file collaboratively or in parallel, without being connected to a server or any other...

HTML5 and CSS3 Transition, Transformation, and Animation (Open Source)
HTML5 and CSS3 Transition, Transformation, and Animation (Open Source)

A handy guide to understanding Microdata, the new JavaScript APIs, and the new form elements in HTML5 and CSS3 along with transition, transformation, and animation using lucid code samples

Overview

  • Discover the semantics of HTML5 and Microdata
  • Understand the concept of the CSS3 Flexible Box...
PHP Objects, Patterns, and Practice
PHP Objects, Patterns, and Practice

PHP Objects Patterns and Practice, Fourth Edition is revised and updated throughout.

The book begins by covering PHP's object-oriented features. It introduces key topics including class declaration, inheritance, reflection and much more. These provide the fundamentals of the PHP's support for objects. It also
...
Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and...

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

Result Page: Previous 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy