-
-
-
MATLAB: A Practical Introduction 5th Edition
... ’s 2017 Textbook Excellence Award (“Texty”), guides the reader through both programming and built-in functions to easily exploit MATLAB’s extensive capabilities for tackling engineering and scientific problems. Assuming no knowledge of programming, this ...
-
Advanced BlackBerry Development
... devices and applications are selling by the millions. As a BlackBerry developer, you need an advanced skill set to successfully exploit the most compelling features of the platform. This book will help you develop that skill set and teach you how to ...
-
Mastering Python Design Patterns 2nd Edition
Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition
Exploit various design patterns to master the art of solving problems using Python
Python is an object-oriented scripting language that is used in ...
-
Open Source Intelligence Methods and Tools
Open Source Intelligence Methods and Tools focuses on building a deep understanding of how to exploit open source intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support intelligence
...
-
docker on amazon web services
... learn
Build, deploy, and operate Docker applications using AWS
Solve key operational challenges, such as secrets management
Exploit the powerful capabilities and tight integration of other AWS services
Design and operate Docker applications running on ...
-
Kali Linux Web Penetration Testing Cookbook 2nd - 2018
... website
Identify cross-site scripting and client-side vulnerabilities
Exploit vulnerabilities that allow the insertion of code into ... want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. The ...
-
SQLi Dumper v.8.0(国外SQL网站注入工具)
... ######
Info
######
Title : Beyond SQLi: Obfuscate and Bypass
Author : "ZeQ3uL" (Prathan Phongthiproek) and "Suphot Boonchamnan"
Team : CWH Underground [http://www.exploit-db.com/author/?a=1275]
-
Energy Efficient Smart Phones for 5G Networks
... seamless mobility and high speed connectivity within a HetNet environment.
Specifically, the authors investigate how we can exploit the cooperation paradigm and context-aware mechanism working in synergy to provide energy compliant phones that can ...
-
Professional Android(精通安卓第四版红皮书)
... of projects, each introducing a new Android platform feature and highlighting the techniques and best practices that exploit its utmost functionality. The exercises begin simply, and gradually build into advanced Android development. Clear, concise ...
-