HTML5: Drag and Drop in Depth
HTML5: Drag and Drop in Depth with Bill Weinman MOV + Exercise Files | Duration: 1h | 960×540 | Video: 30 fps 931 kbps | Audio: AAC 48KHz 159 kbps 2 stereo | 155 MB Genre: eLearning | Level:...
View ArticleArduino For Dummies
John Nussey, “Arduino For Dummies” ISBN: 1118446372 | 2013 | PDF | 446 pages | 31 MB The quick, easy way to leap into the fascinating world of physical computing This is no ordinary circuit board....
View ArticlePluralsight – Manage Office Data with SharePoint 2013
Pluralsight – Manage Office Data with SharePoint 2013 English | .MP4 | h264, yuv420p, 1024×768, 15.00 fps(r) | aac, 44100 Hz, stereo | 802 MB Genre: E-learning In this course you will learn how to use...
View ArticleAccess 2013 Workshop: Eine Datenbank richtig entwickeln Vom Datenmodell bis...
Access 2013 Workshop: Eine Datenbank richtig entwickeln Vom Datenmodell bis zur fertigen Anwendung | 841 MB Duration : 5 Std. 18 min | Video: AVC (.mp4) 1280×720 25fps | Audio: AAC 44.1KHz 1ch Genre:...
View ArticleLearning Android Game Programming: A Hands-On Guide to Building Your First...
Learning Android Game Programming: A Hands-On Guide to Building Your First Android Game by Richard A. Rogers English | ISBN: 0321769627 | 2012 | PDF | 480 pages | 10,9 MB Build the Next Great Android...
View ArticleCreating Android Applications: Develop and Design
Creating Android Applications: Develop and Design by Chris Haseman English | ISBN: 032178409X | 2012 | PDF | 272 pages | 5,1 MB Capturing more than half of the global smartphone market, Google’s...
View ArticleMastering Ninject for Dependency Injection
Mastering Ninject for Dependency Injection By Daniel Baharestani 2013 | 142 Pages | ISBN: 1782166203 | EPUB + PDF | 1 MB + 2 MB Dependency injection is an approach to creating loosely coupled...
View ArticleInformation Security Risk Analysis, 3rd edition
Information Security Risk Analysis, 3d edition By Thomas R. Peltier 2010 | 456 Pages | ISBN: 1439839565 | PDF | 8 MB Successful security professionals have had to modify the process of responding to...
View ArticleComputer Security Basics
Rick Lehtinen, Deborah Russell, G.T. Gangemi, “Computer Security Basics, 2nd Edition” ISBN: 0596006691 | 2006 | EPUB | 312 pages | 2 MB This is the must-have book for a must-know field. Today, general...
View ArticleHacking Exposed: Web Applications
Joel Scambray, Vincent Liu, Caleb Sima, “Hacking Exposed: Web Applications, 3rd Edition” ISBN: 0071740643 | 2011 | EPUB | 482 pages | 14 MB The latest Web app attacks and countermeasures from...
View ArticleCBT Nuggets – (ISC)2 Security CISSP
CBT Nuggets – (ISC)2 Security CISSP English | 02.2014 | flv | H264 1280×720 | AAC 1 ch | 12 hrs | 2.79 GB eLearning This video training with Michael Shannon covers information security, including...
View ArticleWeb Penetration Testing with Kali Linux
Joseph Muniz, Aamir Lakhani, “Web Penetration Testing with Kali Linux” English | ISBN: 1782163166 | 2013 | 321 pages | PDF (reup), EPUB | 64 MB Kali Linux is built for professional penetration testing...
View ArticleCuckoo Malware Analysis
Digit Oktavianto and Iqbal Muhardianto, “Cuckoo Malware Analysis” English | ISBN: 1782169237 | 2013 | 142 pages | PDF, EPUB | 23 MB Cuckoo Sandbox is a leading open source automated malware analysis...
View ArticleKali Linux Cookbook
Willie L. Pritchett, David De Smet, “Kali Linux Cookbook” English | 2013 | ISBN: 1783289597 | 260 pages | EPUB | 24 MB Over 70 recipes to help you master Kali Linux for effective penetration security...
View ArticleThreat Modeling: Designing for Security
Adam Shostack, “Threat Modeling: Designing for Security” English | ISBN: 1118809998 | 2014 | PDF | 624 pages | 5,4 MB Adam Shostack is responsible for security development lifecycle threat modeling at...
View ArticleVMware vCloud Security
Prasenjit Sarkar, “VMware vCloud Security” English | ISBN: 1782170960 | 2013 | 114 pages | PDF, EPUB | 14 MB Security is a major concern, in particular now that everything is moving to the cloud. A...
View ArticleIT Security Risk Management: Perceived IT Security Risks in the Context of...
IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing By Tobias Ackermann 2013 | 224 Pages | ISBN: 3658011149 | PDF | 4 MB This book provides a comprehensive...
View ArticleEnterprise Integration with WSO2 ESB
Prabath Siriwardena, “Enterprise Integration with WSO2 ESB” English | ISBN: 1783280190 | 2013 | 92 pages | PDF, EPUB | 2 MB The Enterprise Service Bus (ESB) serves as a key component in most of the...
View ArticleData Visualization with d3.js
Data Visualization with D3.js by Nick Qi Zhu 2013 | ISBN: 1782160000 | English | 194 Pages | PDF + EPUB | 3 + 6 MB Mold your data into beautiful visualizations with d3.js Overview Build blocks of web...
View ArticleGetting Started with Simulink
Luca Zamboni, “Getting Started with Simulink” English | ISBN: 178217138X | 2013 | 132 pages | PDF, EPUB | 7 MB Simulink is an engineer’s Swiss army knife: instead of spending the day typing out...
View Article