Home | Amazing | Today | Tags | Publishers | Years | Search 
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
PHP, MySQL, & JavaScript All-in-One For Dummies (Computer/Tech)
PHP, MySQL, & JavaScript All-in-One For Dummies (Computer/Tech)

Explore the engine that drives the internet

It takes a powerful suite of technologies to drive the most-visited websites in the world. PHP, mySQL, JavaScript, and other web-building languages serve as the foundation for application development and programming projects at all levels of the web. 

...

Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll...
Samsung Galaxy S7 For Dummies (For Dummies (Computer/tech))
Samsung Galaxy S7 For Dummies (For Dummies (Computer/tech))
Your fun and accessible user's guide to the Samsung Galaxy S 7

Technology alone can be intimidating, and the printed documentation and online support that come with a new smartphone can be just as baffling. Thankfully, Samsung Galaxy S 7 For Dummies is here to give you easy-to-follow guidance on all the features...

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Are you interested in learning about how to hack systems?

Do you want to learn how to protect yourself from being hacked?

Do you wish to learn the art of ethical hacking?

Do you want to know the secrets techniques that genius hackers use?

Do you want to learn how to protect yourself...

Excel Functions and Formulas Pocketbook
Excel Functions and Formulas Pocketbook
Geared toward the intermediate to advanced Excel 2016 user, this pocketbook provides explanations and context for many powerful Excel 2016 spreadsheet formulas and functions. Step-by-step instructions for many formula/function-related features such as using range names, and Excel's troubleshooting features. Focus on clarity, accuracy,...
Python: Master the Art of Design Patterns
Python: Master the Art of Design Patterns

About This Book

  • Learn all about abstract design patterns and how to implement them in Python 3
  • Understand the structural, creational, and behavioral Python design patterns
  • Get to know the context and application of design patterns to solve real-world problems in software...
PHP 7 Data Structures and Algorithms: Implement linked lists, stacks, and queues using PHP
PHP 7 Data Structures and Algorithms: Implement linked lists, stacks, and queues using PHP

Key Features

  • Gain a complete understanding of data structures using a simple approach
  • Analyze algorithms and learn when you should apply each solution
  • Explore the true potential of functional data structures

Book Description

PHP has always...

Mastering IPython 4.0
Mastering IPython 4.0

Key Features

  • Most updated book on Interactive computing with IPython 4.0;
  • Detailed, example-rich guide that lets you use the most advanced level interactive programming with IPython;
  • Get flexible interactive programming with IPython using this comprehensive guide
...
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley,...

Raspberry Pi For Kids For Dummies
Raspberry Pi For Kids For Dummies
Getting acquainted with your Raspberry Pi has never been sweeter

Raspberry Pi For Kids For Dummies makes it easy for kids to set-up, operate, and troubleshoot like a Pi pro! Introducing you to Pi through a series of entertaining and inspiring projects, this handy, step-by-step guide shows you how to write computer...

Result Page: Previous 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy