Quantcast
Browsing all 3629 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

HTML5: Drag and Drop in Depth

HTML5: Drag and Drop in Depth with Bill Weinman MOV + Exercise Files | Duration: 1h | 960×540 | Video: 30 fps 931 kbps | Audio: AAC 48KHz 159 kbps 2 stereo | 155 MB Genre: eLearning | Level:...

View Article


Image may be NSFW.
Clik here to view.

Arduino For Dummies

John Nussey, “Arduino For Dummies” ISBN: 1118446372 | 2013 | PDF | 446 pages | 31 MB The quick, easy way to leap into the fascinating world of physical computing This is no ordinary circuit board....

View Article


Image may be NSFW.
Clik here to view.

Pluralsight – Manage Office Data with SharePoint 2013

Pluralsight – Manage Office Data with SharePoint 2013 English | .MP4 | h264, yuv420p, 1024×768, 15.00 fps(r) | aac, 44100 Hz, stereo | 802 MB Genre: E-learning In this course you will learn how to use...

View Article

Image may be NSFW.
Clik here to view.

Access 2013 Workshop: Eine Datenbank richtig entwickeln Vom Datenmodell bis...

Access 2013 Workshop: Eine Datenbank richtig entwickeln Vom Datenmodell bis zur fertigen Anwendung | 841 MB Duration : 5 Std. 18 min | Video: AVC (.mp4) 1280×720 25fps | Audio: AAC 44.1KHz 1ch Genre:...

View Article

Image may be NSFW.
Clik here to view.

Learning Android Game Programming: A Hands-On Guide to Building Your First...

Learning Android Game Programming: A Hands-On Guide to Building Your First Android Game by Richard A. Rogers English | ISBN: 0321769627 | 2012 | PDF | 480 pages | 10,9 MB Build the Next Great Android...

View Article


Image may be NSFW.
Clik here to view.

Creating Android Applications: Develop and Design

Creating Android Applications: Develop and Design by Chris Haseman English | ISBN: 032178409X | 2012 | PDF | 272 pages | 5,1 MB Capturing more than half of the global smartphone market, Google’s...

View Article

Image may be NSFW.
Clik here to view.

Mastering Ninject for Dependency Injection

Mastering Ninject for Dependency Injection By Daniel Baharestani 2013 | 142 Pages | ISBN: 1782166203 | EPUB + PDF | 1 MB + 2 MB Dependency injection is an approach to creating loosely coupled...

View Article

Image may be NSFW.
Clik here to view.

Information Security Risk Analysis, 3rd edition

Information Security Risk Analysis, 3d edition By Thomas R. Peltier 2010 | 456 Pages | ISBN: 1439839565 | PDF | 8 MB Successful security professionals have had to modify the process of responding to...

View Article


Image may be NSFW.
Clik here to view.

Computer Security Basics

Rick Lehtinen, Deborah Russell, G.T. Gangemi, “Computer Security Basics, 2nd Edition” ISBN: 0596006691 | 2006 | EPUB | 312 pages | 2 MB This is the must-have book for a must-know field. Today, general...

View Article


Image may be NSFW.
Clik here to view.

Hacking Exposed: Web Applications

Joel Scambray, Vincent Liu, Caleb Sima, “Hacking Exposed: Web Applications, 3rd Edition” ISBN: 0071740643 | 2011 | EPUB | 482 pages | 14 MB The latest Web app attacks and countermeasures from...

View Article

Image may be NSFW.
Clik here to view.

CBT Nuggets – (ISC)2 Security CISSP

CBT Nuggets – (ISC)2 Security CISSP English | 02.2014 | flv | H264 1280×720 | AAC 1 ch | 12 hrs | 2.79 GB eLearning This video training with Michael Shannon covers information security, including...

View Article

Image may be NSFW.
Clik here to view.

Web Penetration Testing with Kali Linux

Joseph Muniz, Aamir Lakhani, “Web Penetration Testing with Kali Linux” English | ISBN: 1782163166 | 2013 | 321 pages | PDF (reup), EPUB | 64 MB Kali Linux is built for professional penetration testing...

View Article

Image may be NSFW.
Clik here to view.

Cuckoo Malware Analysis

Digit Oktavianto and Iqbal Muhardianto, “Cuckoo Malware Analysis” English | ISBN: 1782169237 | 2013 | 142 pages | PDF, EPUB | 23 MB Cuckoo Sandbox is a leading open source automated malware analysis...

View Article


Image may be NSFW.
Clik here to view.

Kali Linux Cookbook

Willie L. Pritchett, David De Smet, “Kali Linux Cookbook” English | 2013 | ISBN: 1783289597 | 260 pages | EPUB | 24 MB Over 70 recipes to help you master Kali Linux for effective penetration security...

View Article

Image may be NSFW.
Clik here to view.

Threat Modeling: Designing for Security

Adam Shostack, “Threat Modeling: Designing for Security” English | ISBN: 1118809998 | 2014 | PDF | 624 pages | 5,4 MB Adam Shostack is responsible for security development lifecycle threat modeling at...

View Article


Image may be NSFW.
Clik here to view.

VMware vCloud Security

Prasenjit Sarkar, “VMware vCloud Security” English | ISBN: 1782170960 | 2013 | 114 pages | PDF, EPUB | 14 MB Security is a major concern, in particular now that everything is moving to the cloud. A...

View Article

Image may be NSFW.
Clik here to view.

IT Security Risk Management: Perceived IT Security Risks in the Context of...

IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing By Tobias Ackermann 2013 | 224 Pages | ISBN: 3658011149 | PDF | 4 MB This book provides a comprehensive...

View Article


Image may be NSFW.
Clik here to view.

Enterprise Integration with WSO2 ESB

Prabath Siriwardena, “Enterprise Integration with WSO2 ESB” English | ISBN: 1783280190 | 2013 | 92 pages | PDF, EPUB | 2 MB The Enterprise Service Bus (ESB) serves as a key component in most of the...

View Article

Image may be NSFW.
Clik here to view.

Data Visualization with d3.js

Data Visualization with D3.js by Nick Qi Zhu 2013 | ISBN: 1782160000 | English | 194 Pages | PDF + EPUB | 3 + 6 MB Mold your data into beautiful visualizations with d3.js Overview Build blocks of web...

View Article

Image may be NSFW.
Clik here to view.

Getting Started with Simulink

Luca Zamboni, “Getting Started with Simulink” English | ISBN: 178217138X | 2013 | 132 pages | PDF, EPUB | 7 MB Simulink is an engineer’s Swiss army knife: instead of spending the day typing out...

View Article
Browsing all 3629 articles
Browse latest View live