Chocotto Sister | Great News | The Lion Guard
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
Building Arduino Projects for the Internet of Things: Experiments with Real-World Applications
Building Arduino Projects for the Internet of Things: Experiments with Real-World Applications

Gain a strong foundation of Arduino-based device development, from which you can go in any direction according to your specific development needs and desires. You'll build Arduino-powered devices for everyday use, and then connect those devices to the Internet. 

You'll be introduced to the building...

Penetration Testing Bootcamp
Penetration Testing Bootcamp

Key Features

  • Get practical demonstrations with in-depth explanations of complex security-related problems
  • Familiarize yourself with the most common web vulnerabilities
  • Get step-by-step guidance on managing testing results and reporting

Book Description

...

Agile UX Storytelling: Crafting Stories for Better Software Development
Agile UX Storytelling: Crafting Stories for Better Software Development

Learn how to use stories throughout the agile software development lifecycle. Through lessons and examples, Agile UX Storytelling demonstrates to product owners, customers, scrum masters, software developers, and designers how to craft stories to facilitate communication, identify problems and patterns, refine collaborative...

User Stories Applied: For Agile Software Development (Addison-Wesley Signature Series)
User Stories Applied: For Agile Software Development (Addison-Wesley Signature Series)
Thoroughly reviewed and eagerly anticipated by the agile community, User Stories Applied offers a requirements process that saves time, eliminates rework, and leads directly to better software.

The best way to build software that meets users' needs is to begin with "user stories": simple, clear, brief descriptions of...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Milestones in Matrix Computation: The selected works of Gene H. Golub with commentaries
Milestones in Matrix Computation: The selected works of Gene H. Golub with commentaries
At a meeting in Moscow in June 2005, Gil Strang suggested that there be a collection of Gene Golub's work to highlight his many important contributions to numerical analysis. The three of us were honored to undertake this pleasant task, with publication timed for February "29", 2007, the 75th anniversary of Gene's birth.

Gene
...
Instant Kali Linux
Instant Kali Linux

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...

Tcl 8.5 Network Programming
Tcl 8.5 Network Programming

Tcl (Tool Command Language) is a very powerful and easy to learn dynamic programming language, suitable for a very wide range of uses. Tcl is regarded as one of the best-kept secrets in the software industry. This book gives you a hands-on experience on Tcl, helping you develop network-aware applications using this mature yet evolving...

Business and Competitive Analysis: Effective Application of New and Classic Methods
Business and Competitive Analysis: Effective Application of New and Classic Methods

“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.”
--Bill Fiora, Partner and Founder, Outward Insights

  

Business Intelligence: Data Mining and Optimization for Decision Making
Business Intelligence: Data Mining and Optimization for Decision Making

Business intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. The term implies having a comprehensive knowledge of all factors that affect a business, such as customers, competitors, business partners,...

Forensic Art (Crime Scene Investigations)
Forensic Art (Crime Scene Investigations)

The popularity of crime scene and investigative crime shows on television has come as a surprise to many who work in the field. The main surprise is the concept that crime scene analysts are the true crime solvers, when in truth, it takes dozens of people, doing many different jobs, to solve a crime. Often, the crime scene analyst’s...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy