Bella and the Bulldogs | Download | Floricienta
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business

  • Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
  • Covers 'What to...
Python Unlocked
Python Unlocked

Key Features

  • Write smarter, bug-free, high performance code with minimal effort
  • Uncover the best tools and options available to Python developers today
  • Deploy decorators, design patters, and various optimization techniques to use Python 3.5 effectively

Book...

Enterprise Web Development: Building HTML5 Applications: From Desktop to Mobile
Enterprise Web Development: Building HTML5 Applications: From Desktop to Mobile

If you want to build your organization’s next web application with HTML5, this practical book will help you sort through the various frameworks, libraries, and development options that populate this stack. You’ll learn several of these approaches hands-on by writing multiple versions of a sample web app throughout the...

Program Management for Improved Business Results
Program Management for Improved Business Results

Superior program management begins with superior information and strategy

Program Management for Improved Business Results, Second Edition is a practical guide to real-world program management, written to align with the rigorous PMI® PgMP® certification standards. The book explains the benchmarks and best...

Statistical Analysis of Management Data
Statistical Analysis of Management Data

Statistical Analysis of Management Data provides a comprehensive approach to multivariate statistical analyses that are important for researchers in all fields of management, including finance, production, accounting, marketing, strategy, technology, and human resources. This book is especially designed to provide doctoral students...

Design Patterns Explained: A New Perspective on Object-Oriented Design
Design Patterns Explained: A New Perspective on Object-Oriented Design
"...I would expect that readers with a basic understanding of object-oriented programming and design would find this book useful, before approaching design patterns completely. Design Patterns Explained complements the existing design patterns texts and may perform a very useful role, fitting between...
Functional Programming Patterns in Scala and Clojure: Write Lean Programs for the JVM
Functional Programming Patterns in Scala and Clojure: Write Lean Programs for the JVM

Solve real-life programming problems with a fraction of the code that pure object-oriented programming requires. Use Scala and Clojure to solve in-depth problems with two sets of patterns: object-oriented patterns that become more concise with functional programming, and natively functional patterns. Your code will be more declarative, with...

xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
Automated testing is a cornerstone of agile development. An effective testing strategy will deliver new functionality more aggressively, accelerate user feedback, and improve quality. However, for many developers, creating effective automated tests is a unique and unfamiliar challenge.

xUnit Test Patterns is the...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data...
The Mathematics of Games and Gambling (Mathematical Association of America Textbooks)
The Mathematics of Games and Gambling (Mathematical Association of America Textbooks)
'The whole book is written with great urbanity and clarity ... it is hard to see how it could have been better or more readable.' The Mathematical Gazette

You can't lose with this MAA Book Prize winner if you want to see how mathematics can be used to analyze games of chance and skill. Roulette, craps, blackjack, backgammon,
...
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation
Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation

Getting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing...

Result Page: 98 97 96 95 94 93 92 91 90 89 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy