• Welcome!
Total books

Computer & Internet

AI and Robotics
165
Algorithms
19
Communicaion and Telecommunication
111
Databases
716

Hardware
331
Information Technology
305
Mobile Computing
542
Network Security
69

Operating System
298
Programming
1573
Security
136
Software Engineering
172

Web Design & Development
437
Web Development
1343
Graphics & Design
234
Administration
289

Enterprise
145
Cloud
373
Sort by
Mobile Application Penetration Testing

Gain insights into the current threat landscape of mobile applications in particular Explore the different options that are available on mobile platforms and prevent circumventions made by attackers This is a step-by-step guide to setting up your own mobile penetration testing environment

Mastering Mobile Forensics
Mastering Mobile Forensics Sented by Rebecca

A mastering guide to help you overcome the roadblocks you face when dealing with mobile forensics Excel at the art of extracting data, recovering deleted data, bypassing screen locks, and much more Get best practices to how to collect and analyze mobile device data and accurately document your investigations

Mastering Jenkins
Mastering Jenkins Sented by Rebecca

About This Book Configure and horizontally scale a Jenkins installation to support a development organization of any size Implement Continuous Integration, Continuous Delivery, and Continuous Deployment solutions in Jenkins A step-by-step guide to help you get the most out of the powerful automation orchestration platform that is Jenkins

Migrating to iPhone and iPad for .NET Developers (Expert's Voice in .NET)

Today's .NET developers are intrigued by what the iPhone and iPad apps landscape has to offer. Admit it: you're one of them. Apple's App Store has hundreds of thousands of apps, and yours can be among them. iPhone and iPad app development using the iOS software development kit is one of the most appealing environments available for mobile technology.

Linux Server Security: Hack and Defend

Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction.

Machine Learning with PySpark: With Natural Language Processing and Recommender Systems

Build machine learning models, natural language processing applications, and recommender systems with PySpark to solve various business challenges. This book starts with the fundamentals of Spark and its evolution and then covers the entire spectrum of traditional machine learning algorithms along with natural language processing and recommender systems using PySpark.

Kotlin Cookbook: A Problem-Focused Approach

Use Kotlin to build Android apps, web applications, and more—while you learn the nuances of this popular language. With this unique cookbook, developers will learn how to apply thisJava-based language to their own projects. Both experienced programmers and those new to Kotlin will benefit from the practical recipes in this book.

Learn Java with Math: Using Fun Projects and Games

There are many good Java programming books on the market, but it's not easy to find one fit for a beginner. This book simplifies the complexity of Java programming and guides you through the journey to effectively work under the hood.

Fonts & Encodings: From Advanced Typography to Unicode and Everything in Between

This reference is a fascinating and complete guide to using fonts and typography on the Web and across a variety of operating systems and application software. Fonts & Encodings shows you how to take full advantage of the incredible number of typographic options available, with advanced material that covers everything from designing glyphs to developing software that creates and processes fonts.

Hardening Azure Applications: Techniques and Principles for Building Large-Scale, Mission-Critical Applications

Build large-scale, mission-critical hardened applications on the Azure cloud platform. This 2nd edition provides information on the newer features in Azure, such as Linux extensions and supporting Azure Services such as HDInsight and SQL Server on Linux. Updated with new applications Hardening Azure Applications also discusses Scale Sets (VMSS), a major upgrade that enables autoscaling and seamlessly makes machines ready for high availability.

Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

Exploring Cloud Computing
Exploring Cloud Computing Sented by Musa

Cloud Computing is enabling many trends in IT today: microservices, pay-as-you-go pricing, and serverless architectures, to name three.

Docker Cookbook
Docker Cookbook Sented by Sarah Gerdes

80 hands-on recipes to efficiently work with the Docker 1.6 environment on Linux About This Book Provides practical techniques and knowledge of various emerging and developing APIs to help you create scalable services Create, manage, and automate production-quality services while dealing with inherent issues.

Docker: Docker Tutorial for Beginners Build Ship and Run

This tutorial explains the various aspects of the Docker Container service. Starting with the basics of Docker which focuses on the installation and configuration of Docker, it gradually moves on to advanced topics such as Networking and Registries.

Sort by