Eps13 Blood Drive - Season 1 (2017) | Willie Stewart | Thriller
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Android 6 Essentials
Android 6 Essentials

Design, build, and create your own applications using the full range of features available in Android 6

About This Book

  • Learn how to utilize the robust features of Android 6 to design, develop, and publish better Android applications
  • Get useful guidance on creating new apps or migrating...
Lean from the Trenches: Managing Large-Scale Projects with Kanban
Lean from the Trenches: Managing Large-Scale Projects with Kanban

You know the Agile and Lean development buzzwords, you've read the books. But when systems need a serious overhaul, you need to see how it works in real life, with real situations and people. Lean from the Trenches is all about actual practice. Every key point is illustrated with a photo or diagram, and anecdotes bring you...

Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Game-Based Marketing: Inspire Customer Loyalty Through Rewards, Challenges, and Contests
Game-Based Marketing: Inspire Customer Loyalty Through Rewards, Challenges, and Contests

Harness the power of games to create extraordinary customer engagement with Game-Based Marketing.

Gamification is revolutionizing the web and mobile apps.

Innovative startups like Foursquare and Swoopo, growth companies like Gilt and Groupon and established brands like United Airlines and Nike all agree: the most...

Privacy on the Line: The Politics of Wiretapping and Encryption
Privacy on the Line: The Politics of Wiretapping and Encryption
In the spring of 1993, the White House announced an unprecedented plan for both promoting and
controlling the use of secret codes to keep communications private. The plan, formally called key
escrow but popularly known as "Clipper" after its star component, the Clipper chip, was to adopt a
new federal standard for
...
Real Influence: Persuade Without Pushing and Gain Without Giving In
Real Influence: Persuade Without Pushing and Gain Without Giving In

The authors argue against the aggressive selling of ideas and instead emphasize listening, genuine engagement and commitment to a lasting business relationship in order to get someone to come around to one's way of thinking.

...
Indigenous Pop: Native American Music from Jazz to Hip Hop
Indigenous Pop: Native American Music from Jazz to Hip Hop
Popular music compels, it entertains, and it has the power to attract and move audiences. With that in mind, the editors of Indigenous Pop showcase the contributions of American Indian musicians to popular forms of music, including jazz, blues, country-western, rock and roll, reggae, punk, and hip hop.

From Joe
...
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in forensic analysis. I am not an expert in Windows Registry analysis. I am simply, by profession, a responder and analyst with some work and research experience in this area. I have also performed a number...

From Java to Ruby: Things Every Manager Should Know
From Java to Ruby: Things Every Manager Should Know
As I drove across the central Texas landscape, my excitement and anxiety were both building. I was driving to a new client that would change everything for me. This short trip would take me an hour south to a small college town, but symbolically I was beginning a much longer journey. I was going from Java to Ruby.

The past year, I had
...
Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
The Browser Hacker's Handbook
The Browser Hacker's Handbook

Hackers exploit browser vulnerabilities to attack deep within networks

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security...

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines...

Result Page: 11 10 9 8 7 6 5 4 3 2 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy