• Welcome!
Total books

Computer & Internet

Administration
289
AI and Robotics
165
Algorithms
19
Cloud
373

Communicaion and Telecommunication
111
Databases
716
Enterprise
145
Graphics & Design
234

Hardware
331
Information Technology
305
Mobile Computing
542
Network Security
69

Operating System
298
Programming
1572
Security
136
Software Engineering
172

Web Design & Development
437
Web Development
1343
Sort by
Troubleshooting-and-Maintaining-Your-PC-All-in-One-For-Dummies-3rd-Edition

Need a PC problem fixed in a pinch? Presto! Troubleshooting & Maintaining Your PC All-in-One For Dummies offers 5 books in 1 and takes the pain out of wading through those incomprehensible manuals, or waiting for a high-priced geek to show up days or weeks after you need them. Arming you with everything you need to get that pesky PC working for you ASAP, this handy guide walks you through all the steps to restoring whatever's making your PC go rogue —so you can get back to making it work for you.

Visual Basic.NET at Work: Building 10 Enterprise Projects

Gain the tools to create 10 reusable enterprise projects utilizing the new features of VB.NET Going beyond the standard reference books, Tony Martin takes readers step-by-step through the process of creating ten reusable enterprise applications with the next version of Microsoft's leading programming language-Visual Basic.NET. Readers will start by building a standard application template, which will form the basis of all the projects. Martin explains how to combine VB.NET with other key technologies, such as Web Services, ASP.NET, XML, WebForms, and the Microsoft Mobile Framework, to solve the important issues corporate Visual Basic programmers face today.

Practical Windows Forensics
Practical Windows Forensics Sented by Sarah Gerdes

Build your own lab environment to analyze forensic data and practice techniques. This book offers meticulous coverage with an example-driven approach and helps you build the key skills of performing forensics on Windows-based systems using digital artifacts. It uses specific open source and Linux-based tools so you can become proficient at analyzing forensic data and upgrade your existing knowledge.

Securing Office 365: Masterminding MDM and Compliance in the Cloud

Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Sams Teach Yourself Java in 21 Days (Covers Java 11/12) (8th Edition)

In just 21 days, you can acquire the knowledge and skills necessary to develop applications on your computer, web servers, and mobile devices. With this complete tutorial you’ll quickly master the basics and then move on to more advanced features and concepts. Completely updated for Java 11 and 12, this book teaches you about the Java language and how to use it to create applications for any computing environment. By the time you have finished the book, you’ll have well-rounded knowledge of Java and the Java class libraries.

Real-World Machine Learning
Real-World Machine Learning Sented by Sarah Gerdes

Summary Real-World Machine Learning is a practical guide designed to teach working developers the art of ML project execution. Without overdosing you on academic theory and complex mathematics, it introduces the day-to-day practice of machine learning, preparing you to successfully build and deploy powerful ML systems. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

PyTorch Recipes: A Problem-Solution Approach

Get up to speed with the deep learning concepts of Pytorch using a problem-solution approach. Starting with an introduction to PyTorch, you'll get familiarized with tensors, a type of data structure used to calculate arithmetic operations and also learn how they operate. You will then take a look at probability distributions using PyTorch and get acquainted with its concepts. Further you will dive into transformations and graph computations with PyTorch. Along the way you will take a look at common issues faced with neural network implementation and tensor differentiation, and get the best solutions for them.

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.

Pragmatic Unit Testing in Java 8 with JUnit

The Pragmatic Programmers classic is back! Freshly updated for modern software development, Pragmatic Unit Testing in Java 8 With JUnit teaches you how to write and run easily maintained unit tests in JUnit with confidence. You'll learn mnemonics to help you know what tests to write, how to remember all the boundary conditions, and what the qualities of a good test are. You'll see how unit tests can pay off by allowing you to keep your system code clean, and you'll learn how to handle the stuff that seems too tough to test.

Practice of Cloud System Administration, The: Designing and Operating Large Distributed Systems, Volume 2

“There’s an incredible amount of depth and thinking in the practices described here, and it’s impressive to see it all in one place.” —Win Treese, coauthor of Designing Systems for Internet Commerce The Practice of Cloud System Administration, Volume 2, focuses on “distributed” or “cloud” computing and brings a DevOps/SRE sensibility to the practice of system administration. Unsatisfied with books that cover either design or operations in isolation, the authors created this authoritative reference centered on a comprehensive approach.

OCP Oracle Certified Professional Java SE 11 Programmer I Study Guide: Exam 1Z0-815

Used primarily in mobile and desktop application development, Java is a platform-independent, object-oriented programming language. It is the principal language used in Android application development as well as a popular language for client-side cloud applications. Oracle has updated its Java Programmer certification tracks for Oracle Certified Professional.

Applied Network Security: Proven tactics to detect and defend against all kinds of network attack

Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark Become an expert in cracking WiFi passwords, penetrating anti-virus networks, sniffing the network, and USB hacks This step-by-step guide shows you how to confidently and quickly detect vulnerabilities for your network before the hacker does

Nagios, 2nd Edition: System and Network Monitoring

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd Edition, updated to address Nagios 3.0, will help you take full advantage of this program.

Sort by