• Welcome!
Total books

Computer & Internet

Administration
289
AI and Robotics
165
Algorithms
19
Cloud
375

Communicaion and Telecommunication
129
Databases
716
Enterprise
145
Graphics & Design
290

Hardware
335
Information Technology
314
Mobile Computing
542
Network Security
69

Operating System
300
Programming
2777
Security
136
Software Engineering
259

Web Design & Development
442
Web Development
1358
Sort by
Mobile Application Penetration Testing

Gain insights into the current threat landscape of mobile applications in particular Explore the different options that are available on mobile platforms and prevent circumventions made by attackers This is a step-by-step guide to setting up your own mobile penetration testing environment

Mastering Mobile Forensics
Mastering Mobile Forensics Sented by Rebecca

A mastering guide to help you overcome the roadblocks you face when dealing with mobile forensics Excel at the art of extracting data, recovering deleted data, bypassing screen locks, and much more Get best practices to how to collect and analyze mobile device data and accurately document your investigations

Mastering Jenkins
Mastering Jenkins Sented by Rebecca

About This Book Configure and horizontally scale a Jenkins installation to support a development organization of any size Implement Continuous Integration, Continuous Delivery, and Continuous Deployment solutions in Jenkins A step-by-step guide to help you get the most out of the powerful automation orchestration platform that is Jenkins

Migrating to iPhone and iPad for .NET Developers (Expert's Voice in .NET)

Today's .NET developers are intrigued by what the iPhone and iPad apps landscape has to offer. Admit it: you're one of them. Apple's App Store has hundreds of thousands of apps, and yours can be among them. iPhone and iPad app development using the iOS software development kit is one of the most appealing environments available for mobile technology.

Linux Server Security: Hack and Defend

Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction.

Machine Learning with PySpark: With Natural Language Processing and Recommender Systems

Build machine learning models, natural language processing applications, and recommender systems with PySpark to solve various business challenges. This book starts with the fundamentals of Spark and its evolution and then covers the entire spectrum of traditional machine learning algorithms along with natural language processing and recommender systems using PySpark.

Kotlin Cookbook: A Problem-Focused Approach

Use Kotlin to build Android apps, web applications, and more—while you learn the nuances of this popular language. With this unique cookbook, developers will learn how to apply thisJava-based language to their own projects. Both experienced programmers and those new to Kotlin will benefit from the practical recipes in this book.

Learn Java with Math: Using Fun Projects and Games

There are many good Java programming books on the market, but it's not easy to find one fit for a beginner. This book simplifies the complexity of Java programming and guides you through the journey to effectively work under the hood.

Fonts & Encodings: From Advanced Typography to Unicode and Everything in Between

This reference is a fascinating and complete guide to using fonts and typography on the Web and across a variety of operating systems and application software. Fonts & Encodings shows you how to take full advantage of the incredible number of typographic options available, with advanced material that covers everything from designing glyphs to developing software that creates and processes fonts.

Hardening Azure Applications: Techniques and Principles for Building Large-Scale, Mission-Critical Applications

Build large-scale, mission-critical hardened applications on the Azure cloud platform. This 2nd edition provides information on the newer features in Azure, such as Linux extensions and supporting Azure Services such as HDInsight and SQL Server on Linux. Updated with new applications Hardening Azure Applications also discusses Scale Sets (VMSS), a major upgrade that enables autoscaling and seamlessly makes machines ready for high availability.

Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

Exploring Cloud Computing
Exploring Cloud Computing Sented by Musa

Cloud Computing is enabling many trends in IT today: microservices, pay-as-you-go pricing, and serverless architectures, to name three.

Docker Cookbook
Docker Cookbook Sented by Sarah Gerdes

80 hands-on recipes to efficiently work with the Docker 1.6 environment on Linux About This Book Provides practical techniques and knowledge of various emerging and developing APIs to help you create scalable services Create, manage, and automate production-quality services while dealing with inherent issues.

Sort by