• Welcome!
Total books

Computer & Internet

AI and Robotics

Communicaion and Telecommunication
Graphics & Design

Information Technology
Mobile Computing
Network Security

Operating System
Software Engineering

Web Design & Development
Web Development
Sort by
Wireshark 2 Quick Start Guide: Secure your network through protocol analysis

Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis over your network in an event of network failure or a security breach

Wireshark Revealed: Essential Skills for IT Professionals

Gain valuable insights into the network and application protocols, and the key fields in each protocol Use Wireshark's powerful statistical tools to analyze your network and leverage its expert system to pinpoint network problems Master Wireshark and train it as your network sniffer


Need a PC problem fixed in a pinch? Presto! Troubleshooting & Maintaining Your PC All-in-One For Dummies offers 5 books in 1 and takes the pain out of wading through those incomprehensible manuals, or waiting for a high-priced geek to show up days or weeks after you need them. Arming you with everything you need to get that pesky PC working for you ASAP, this handy guide walks you through all the steps to restoring whatever's making your PC go rogue —so you can get back to making it work for you.

Visual Basic.NET at Work: Building 10 Enterprise Projects

Gain the tools to create 10 reusable enterprise projects utilizing the new features of VB.NET Going beyond the standard reference books, Tony Martin takes readers step-by-step through the process of creating ten reusable enterprise applications with the next version of Microsoft's leading programming language-Visual Basic.NET. Readers will start by building a standard application template, which will form the basis of all the projects. Martin explains how to combine VB.NET with other key technologies, such as Web Services, ASP.NET, XML, WebForms, and the Microsoft Mobile Framework, to solve the important issues corporate Visual Basic programmers face today.

Practical Windows Forensics
Practical Windows Forensics Sented by Sarah Gerdes

Build your own lab environment to analyze forensic data and practice techniques. This book offers meticulous coverage with an example-driven approach and helps you build the key skills of performing forensics on Windows-based systems using digital artifacts. It uses specific open source and Linux-based tools so you can become proficient at analyzing forensic data and upgrade your existing knowledge.

Securing Office 365: Masterminding MDM and Compliance in the Cloud

Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Sams Teach Yourself Java in 21 Days (Covers Java 11/12) (8th Edition)

In just 21 days, you can acquire the knowledge and skills necessary to develop applications on your computer, web servers, and mobile devices. With this complete tutorial you’ll quickly master the basics and then move on to more advanced features and concepts. Completely updated for Java 11 and 12, this book teaches you about the Java language and how to use it to create applications for any computing environment. By the time you have finished the book, you’ll have well-rounded knowledge of Java and the Java class libraries.

Real-World Machine Learning
Real-World Machine Learning Sented by Sarah Gerdes

Summary Real-World Machine Learning is a practical guide designed to teach working developers the art of ML project execution. Without overdosing you on academic theory and complex mathematics, it introduces the day-to-day practice of machine learning, preparing you to successfully build and deploy powerful ML systems. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

PyTorch Recipes: A Problem-Solution Approach

Get up to speed with the deep learning concepts of Pytorch using a problem-solution approach. Starting with an introduction to PyTorch, you'll get familiarized with tensors, a type of data structure used to calculate arithmetic operations and also learn how they operate. You will then take a look at probability distributions using PyTorch and get acquainted with its concepts. Further you will dive into transformations and graph computations with PyTorch. Along the way you will take a look at common issues faced with neural network implementation and tensor differentiation, and get the best solutions for them.

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.

Pragmatic Unit Testing in Java 8 with JUnit

The Pragmatic Programmers classic is back! Freshly updated for modern software development, Pragmatic Unit Testing in Java 8 With JUnit teaches you how to write and run easily maintained unit tests in JUnit with confidence. You'll learn mnemonics to help you know what tests to write, how to remember all the boundary conditions, and what the qualities of a good test are. You'll see how unit tests can pay off by allowing you to keep your system code clean, and you'll learn how to handle the stuff that seems too tough to test.

Practice of Cloud System Administration, The: Designing and Operating Large Distributed Systems, Volume 2

“There’s an incredible amount of depth and thinking in the practices described here, and it’s impressive to see it all in one place.” —Win Treese, coauthor of Designing Systems for Internet Commerce The Practice of Cloud System Administration, Volume 2, focuses on “distributed” or “cloud” computing and brings a DevOps/SRE sensibility to the practice of system administration. Unsatisfied with books that cover either design or operations in isolation, the authors created this authoritative reference centered on a comprehensive approach.

OCP Oracle Certified Professional Java SE 11 Programmer I Study Guide: Exam 1Z0-815

Used primarily in mobile and desktop application development, Java is a platform-independent, object-oriented programming language. It is the principal language used in Android application development as well as a popular language for client-side cloud applications. Oracle has updated its Java Programmer certification tracks for Oracle Certified Professional.

Applied Network Security: Proven tactics to detect and defend against all kinds of network attack

Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark Become an expert in cracking WiFi passwords, penetrating anti-virus networks, sniffing the network, and USB hacks This step-by-step guide shows you how to confidently and quickly detect vulnerabilities for your network before the hacker does

Sort by