|
|
Mastering Nmap Scripting Engine
Master the Nmap Scripting Engine and the art of developing NSE scripts
About This Book
-
Extend the capabilities of Nmap to perform custom tasks with the Nmap Scripting Engine
-
Learn the fundamentals of Lua programming
-
Develop powerful scripts for the Nmap Scripting...
| | Problems and Proofs in Numbers and Algebra
Focusing on an approach of solving rigorous problems and learning how to prove, this volume is concentrated on two specific content themes, elementary number theory and algebraic polynomials. The benefit to readers who are moving from calculus to more abstract mathematics is to acquire the ability to understand proofs through... | | Pro Android Games
Combining actionable, real-world source code with graphics, Pro Android Games, Third Edition shows you how to build more sophisticated and addictive Android game apps with minimum effort. Harness the power of the latest Android 5.0 SDK to bring countless legendary, action-packed PC games to the Android platform.
With... |
|
|
JavaScript Cookbook
Problem solving with JavaScript is a lot trickier now that its use has expanded considerably in size, scope, and complexity. This cookbook has your back, with recipes for common tasks across the JavaScript world, whether you’re working in the browser, the server, or a mobile environment. Each recipe includes reusable code and... | | Lighting Up: The Rise of Social Smoking on College Campuses
While the past 40 years have seen significant declines in adult smoking, this is not the case among young adults, who have the highest prevalence of smoking of all other age groups. At a time when just about everyone knows that smoking is bad for you, why do so many college students smoke? Is it a short lived phase or do they continue ... | | Counterfeit Integrated Circuits: Detection and Avoidance
This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs). Not only does this book provide... |
|
|
Result Page: Previous 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Next |