The Lady Vanishes | John Wick | obyczajowy
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Scripting in Java: Integrating with Groovy and JavaScript
Scripting in Java: Integrating with Groovy and JavaScript

When I wrote the three volumes of Harnessing Java 7 in 2012, I did not include a chapter on the Java Scripting API because of the limited space that I had for each volume. Note the phrase “Java Scripting,” which uses two separate words: “Java” and “Scripting.” “JavaScript” is the name of a...

Red Hat Enterprise Linux Server Cookbook
Red Hat Enterprise Linux Server Cookbook

Key Features

  • Create fully unattended installations and deploy configurations without breaking a sweat
  • Discover and kick-start the newest RHEL 7 configuration and management tools through an easy-to-follow, practical approach for a lazy system management
  • Be guided by an experienced RHEL...
jQuery Essentials
jQuery Essentials

Key Features

  • Build dynamic websites efficiently without any performance issues
  • Learn to use existing jQuery plugins and or write your own for your websites
  • This is the most up-to-date book on the market at the moment, packed with detailed explanations and real-world examples
...
WebRTC Blueprints
WebRTC Blueprints

Develop your very own media applications and services using WebRTC

Overview

  • Create interactive web applications using WebRTC
  • Get introduced to advanced technologies such as WebSocket and Erlang
  • Develop your own secure web applications and services with practical projects
  • ...
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Web Development with Node and Express: Leveraging the JavaScript Stack
Web Development with Node and Express: Leveraging the JavaScript Stack

Learn how to build dynamic web applications with Express, a key component of the Node/JavaScript development stack. In this hands-on guide, author Ethan Brown teaches you the fundamentals through the development of a fictional application that exposes a public website and a RESTful API. You’ll also learn web architecture best...

Beginning J2ME: From Novice to Professional, Third Edition
Beginning J2ME: From Novice to Professional, Third Edition

J2ME is a platform for wireless and mobile Java application development. Beginning J2ME makes this and all the fun you can have with it accessible to the first time wireless Java developer as well as useful to the experienced. This book includes coverage such as sound HTTPS support, lots of user interface API enhancements, a Game API,...

Moodle 2.0 First Look
Moodle 2.0 First Look

The book looks at the main functional areas of Moodle that have significant new features, explains the new features and how to use them. It draws attention to significant differences from how things used to behave, and gives the reader an idea of the kind of consequences these changes will bring to them. If you are an existing Moodle user,...

Pro Wicket (Expert's Voice in Java)
Pro Wicket (Expert's Voice in Java)

I'm glad we're having our first real Wicket book available now...It is more than just a how-to guide; Karthik goes through the effort of explaining alternatives and explains how things are done by Wicket instead of merely giving you the steps...

Mastering Wireshark
Mastering Wireshark

Key Features

  • Master Wireshark and train it as your network sniffer
  • Impress your peers and get yourself pronounced as a network doctor
  • Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network...
Result Page: 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy