Network Attacks and Exploitation: A Framework
Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...
Creating Mobile Apps with jQuery Mobile - Second Edition
Create fully responsive and versatile real-world apps for smartphones with jQuery Mobile 1.4.5
About This Book
Learn how to integrate advanced features such as Geolocation, HTML 5 Video, and the Web Audio API into your web application
Enhance your efficiency by automating repetitive tasks...
Pro Android 5
Pro Android 5 shows you how to build real-world and fun mobile apps using the Android 5 SDK. This book updates the best-selling Pro Android and covers everything from the fundamentals of building apps for smartphones, tablets, and embedded devices to advanced concepts such as custom components, multi-tasking,...
M Is for (Data) Monkey: A Guide to the M Language in Excel Power Query
Power Query is one component of the Power BI (Business Intelligence) product from Microsoft, and “M” is the name of the programming language created by it. As more business intelligence pros begin using Power Pivot, they find that they do not have the Excel skills to clean the data in Excel; Power Query solves this problem. This book...
|Result Page: Previous 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 Next |