6 K Тихоокеанский рубеж 2 2018 | Derek Simonds | • Shingeki no Bahamut: Genesis (Anime 7.7
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C# 7.0 Pocket Reference: Instant Help for C# 7.0 Programmers
C# 7.0 Pocket Reference: Instant Help for C# 7.0 Programmers

When you need answers for programming with C# 7.0, this tightly focused reference tells you exactly what you need to know—without long introductions or bloated examples. Easy-to-browse and ideal as a quick reference, this guide will help experienced C#, Java, and C++ programmers get up to speed with the latest version of the C#...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Agile UX Storytelling: Crafting Stories for Better Software Development
Agile UX Storytelling: Crafting Stories for Better Software Development

Learn how to use stories throughout the agile software development lifecycle. Through lessons and examples, Agile UX Storytelling demonstrates to product owners, customers, scrum masters, software developers, and designers how to craft stories to facilitate communication, identify problems and patterns, refine collaborative...

PHP 7 Zend Certification Study Guide: Ace the ZCE 2017-PHP Exam
PHP 7 Zend Certification Study Guide: Ace the ZCE 2017-PHP Exam
Improve your programming knowledge and become Zend Certified. This book closely follows the ZCE2017-PHP exam syllabus and adds important details that help candidates to prepare for the test. 

Zend Certification is an industry recognized standard for PHP engineers.  It is very difficult to pass the examination without
...
Windows Virus and Malware Troubleshooting (Windows Troubleshooting)
Windows Virus and Malware Troubleshooting (Windows Troubleshooting)

Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.

Whatever version of Windows you’re using, the threat of virus and malware infection is always a common danger. From key...

Network Security Through Data Analysis: From Data to Action
Network Security Through Data Analysis: From Data to Action

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll...

Magento 2 - Build World-Class online stores
Magento 2 - Build World-Class online stores

Create rich and compelling solutions for Magento 2 by developing and implementing solutions, themes, and extensions

About This Book

  • Be proficient in the main functionalities, resources, and system structure of Magento 2
  • Get to grips with this practical and hands-on guide to raise your web...
Building Web Applications with Visual Studio 2017: Using .NET Core and Modern JavaScript Frameworks
Building Web Applications with Visual Studio 2017: Using .NET Core and Modern JavaScript Frameworks

Learn how to build web applications from three Microsoft MVPs. After building the data application layer using Entity Framework Core and a RESTful service using ASP.NET Core, you will then build the client side web application three ways: first, using ASP.NET Core, then using Angular 2, and, finally, using React.  You will be...

Microservices: Building Scalable Software
Microservices: Building Scalable Software

With the introduction of the cloud, enterprise application development moved from monolithic applications to small, lightweight, and process-driven components called microservices.

Microservices architecture is a style of software architecture, which makes application development easier and offers great flexibility to utilize
...

Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Everyday Data Structures
Everyday Data Structures

A practical guide to learning data structures simply and easily

About This Book

  • This book is a very practical, friendly, and useful guide that will help you analyze problems and choose the right data structures for your solution
  • Learn to recognize data patterns for determining which...
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

The only official study guide for the new CCSP exam

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter...

Result Page: Previous 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy