IT eBooks
Download, Read, Use
LINQ to Objects Using C# 4.0
LINQ to Objects Using C# 4.0

Using LINQ to Objects, .NET developers can write queries over object collections with the same deep functionality that was once available only with SQL and relational databases. Now, for the first time, developers have a comprehensive and authoritative guide to applying LINQ to Objects in real-world software. Microsoft MVP Troy Magennis introduces state-of-the-art techniques for working with in-memory collections more elegantly and efficiently - and writing code that is exceptionally powerful, robust, and flexible. ...
Beginning SQL
Beginning SQL

SQL works with databases to insert and extract data and is an international standard for manipulating data in databases. This hands-on resource covers everything from a review of SQL basics and database design to creating your own databases and using the SQL language in a variety of database applications. Packed with essential code, theories, concepts, and techniques, as well as a cache of useful examples, this comprehensive text will have you quickly designing your own databases and writing SQL code sufficient for many real-world situations. Practice exercises in each chapter help speed up your comprehension. ...
iPhone For Dummies, 4th edition
iPhone For Dummies, 4th edition

Completely updated and revised throughout, this full-color guide covers Apple's new iPhone and iOS. Bestselling veteran authors Baig and LeVitus introduce you to the capabilities of the iPhone whether you're making phone calls, browsing the Internet, sending and receiving e-mails, working with the calendar, watching videos, taking great photos, or much more. You'll discover how to set up iTunes, buy music and videos from the iTunes store, protect your information, troubleshoot, multitask, and download the hundreds of thousands of apps available from the App Store. ...
WordPress: The Missing Manual
WordPress: The Missing Manual

Whether you're a budding blogger or web development professional, WordPress is a brilliant tool for creating websites - if you know how to tap its impressive features. This jargon-free Missing Manual shows you how to use WordPress and its themes, plug-ins, and widgets to build just about any website you can imagine, from a classy blog to a basic e-commerce site. ...
HTML5 and JavaScript Web Apps
HTML5 and JavaScript Web Apps

This hands-on book shows you how to work with HTML5, JavaScript MVC frameworks, and the latest W3C specifications to build mobile and desktop web apps that are widely supported across all browsers and devices. You'll quickly master building client-side applications with a loosely coupled backend infrastructure that supports offline clients. Learn how to incorporate web storage, web workers, geolocation, Device Orientation, and WebSockets into your application architecture, using real-world examples. If you're familiar with server-side programming and understand the basics of HTML5, this book is for you. ...
21st Century C
21st Century C

Throw out your old ideas of C, and relearn a programming language that's substantially outgrown its origins. With 21st Century C, you'll discover up-to-date techniques that are absent from every other C text available. C isn't just the foundation of modern programming languages, it is a modern language, ideal for writing efficient, state-of-the-art applications. Learn to dump old habits that made sense on mainframes, and pick up the tools you need to use this evolved and aggressively simple language. No matter what programming language you currently champion, you'll agree that C rocks. ...
Hacking Exposed Windows, 3rd Edition
Hacking Exposed Windows, 3rd Edition

Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors and contributors many years as security professionals hired to break into the world's largest IT infrastructures. ...
Hacking Exposed Web 2.0
Hacking Exposed Web 2.0

Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 - based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE shortcomings. ...
Hacking Exposed, 6th Edition
Hacking Exposed, 6th Edition

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal. New and updated material! ...
Hacking Exposed Computer Forensics, 2nd Edition
Hacking Exposed Computer Forensics, 2nd Edition

Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025