Home | Amazing | Today | Tags | Publishers | Years | Search 
Typed PHP: Stronger Types For Cleaner Code
Typed PHP: Stronger Types For Cleaner Code

Discover how stronger types mean cleaner, more efficient, and optimized PHP applications. This unique book looks at typed PHP: PHP types, strings, regular expressions, and more from PHP 7 as found in standard PHP libraries, user libraries, extensions, and cross-compilers. You'll see how to create a set of reusable tools that...

Securing PHP Apps
Securing PHP Apps

Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.

Is your PHP app truly secure? Let's make sure you get home...

VFX Fundamentals: Visual Special Effects Using Fusion 8.0
VFX Fundamentals: Visual Special Effects Using Fusion 8.0

Learn concepts central to visual special effects using the free Black Magic Design Fusion 8.0 software package. This book also provides foundational background information regarding concepts central to digital image compositing, digital video editing, digital illustration, digital painting, 3D, and digital audio in the first six...

ASP.NET MVC with Entity Framework and CSS
ASP.NET MVC with Entity Framework and CSS

Get up and running quickly with Microsoft ASP.NET MVC and Entity Framework as you build and deploy complex websites. By using a fully working example retail website you will learn solutions to real-world issues that developers frequently encounter.

Whether you are a novice developer or an experienced .NET developer...

IT Security Risk Control Management: An Audit Preparation Plan
IT Security Risk Control Management: An Audit Preparation Plan

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...

Complete Guide to Open Source Big Data Stack
Complete Guide to Open Source Big Data Stack

See a Mesos-based big data stack created and the components used. You will use currently available Apache full and incubating systems. The components are introduced by example and you learn how they work together.

In the Complete Guide to Open Source Big Data Stack, the author begins by creating a private...

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Essential Excel 2016: A Step-by-Step Guide
Essential Excel 2016: A Step-by-Step Guide
This book shows you how easy it is to create, edit, sort, analyze, summarize and format data as well as graph it. Loaded with screen shots, step-by-step instructions, and reader exercises, Essential Excel 2016 makes it easy for you to get to grips with this powerful software and what it can do.


Building a SharePoint 2016 Home Lab: A How-To Reference on Simulating a Realistic SharePoint Testing Environment
Building a SharePoint 2016 Home Lab: A How-To Reference on Simulating a Realistic SharePoint Testing Environment
This book is a step-by-step guide to building your own SharePoint farm in a home lab setting. Learn how to build a windows domain and then join servers into the domain in order to create your own testing and learning environment. After you get the domain stood up, where you go from there is up to you.  This book will help you learn how...
Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka
Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka

Learn how to integrate full-stack open source big data architecture and to choose the correct technology―Scala/Spark, Mesos, Akka, Cassandra, and Kafka―in every layer. 

Big data architecture is becoming a requirement for many different enterprises. So far, however, the focus has largely been on collecting,...

Automated Trading with R: Quantitative Research and Platform Development
Automated Trading with R: Quantitative Research and Platform Development

Learn to trade algorithmically with your existing brokerage, from data management, to strategy optimization, to order execution, using free and publicly available data. Connect to your brokerage’s API, and the source code is plug-and-play.

Automated Trading with R explains automated trading, starting with its...

Stack Frames: A Look From Inside
Stack Frames: A Look From Inside

Teaches you exactly how program memory content and organization is vital for computer security, especially Unix-like operating systems. You will learn how it is manipulated to take control of a computer system, as well as the countermeasures that system designers set up to avoid this. Neither a guide for hackers nor an all-out theory book,...

Result Page: Previous 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy