Access 2016 Bible
The Art of SEO
CryENGINE 3 Game Development
Enterprise Games
امنیت روتر های سیسکو
بهینه سازی کاربردی با نرم افزار MATLAB برنامه نویسی
Applied Optimization with MATLAB Programming
حاکمیت شرکتی و امنیت منابع در چین : دگرگونی منابع جهانی ...
Corporate Governance and Resource Security in China: Th ......
Cypherpunks - Liberdade e o دبخشلود da اینترنت
Cypherpunks - Liberdade e o Futuro da Internet
Fuzzing برای امنیت نرم افزار تضمین کیفیت و تست (خانه Ar ...
Fuzzing for Software Security Testing and Quality Assur ......
بمب افکنهای جنگ جهانی دوم
Database Systems
Burp Suite Essentials
This book aims to impart the skills of a professional Burp user to empower you to successfully perform various kinds of tests on any web application o ...
Getting an Information Security ...
Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Securi ...
Handbook of Communications Secu ...
“Handbook of Communications Security” gives the reader information related to all aspects of communications security, from the fundamental concepts to ...
Access 2016 Bible
Master database creation and management Access 2016 Bible is your, comprehensive reference to the world’s most popular database management tool. With ...
The Art of SEO
If your company is going to succeed in the web economy, optimizing your site for search engine visibility is essential. In this book, four of the most ...
CryENGINE 3 Game Development
CryENGINE is a complete game development environment used by AAA game development studio Crytek to produce blockbuster games such as Crysis 1, 2 and 3 ...
Enterprise Games
Games are playing a crucial role in many successful businesses – not just in PR and marketing, but as a model for designing business systems and workf ...
Hyper-V Server Virtualization S ...
Although resources such as OS and printers are still shared, under the time-sharing model, in a virtualized environment individual virtual servers are ...
iPad For Seniors For Dummies, 9 ...
Break out your reading glasses—iPad instructions for seniors are here Why should the kids have all the fun? If you’re ready to catch up on the latest ...
LinkedIn For Dummies, 4th Editi ...
Build your network, find a job, and been seen as a thought leader LinkedIn is your number-one personal branding tool, and this friendly guide shows yo ...
چگونه در اینترنت سرمان کلاه نرود
توضیحات : اگر قصد خرید های اینترنتی ، پرداخت قبوض ، انجام هرگونه پرداختی بوسیله اینترنت و موارد اینچنینی را دارید ، حتماً این کتاب را مطالعه نمایید. د ...
امنیت روتر های سیسکو
توضیحات : موالف در این کتاب قصد آموزش سیسکو را ندارد بلکه به متدها و روشهای امنیتی، هک و ضدهک آن اشاراتی میکند و در چند بخش سعی میکند به ارایه مطالب ...
حاکمیت شرکتی و امنیت منابع در چین ...
Corporate Governance and Resour ...
Corporate governance has become a household term and investors across the world are demanding more transparency and accountability from controllers of ...
Fuzzing برای امنیت نرم افزار تضمی ...
Fuzzing for Software Security T ...
"Fuzzing for Software Security Testing and Quality Assurance" gives software developers a powerful new tool to build secure, high-quality software, an ...
بمب افکنهای جنگ جهانی دوم
بمب افکنها را می توان مهم ترین سلاح دوربرد مورد استفاده در جنگ جهانی دوم دانست ، با استفاده از بمب افکنها بود که ارتشهای درگیر موفق شدند اهداف بسیار م ...
هنر فراتر از لنزها
Art Beyond the Lens: Working wi ...
بافتهای رویایی و جذاب میتواند کل دنیای جدید را در عکاسی شما نشان دهد. اگرچه، کارهای بسیاری، بیش از ادغام ساده بافتها با یک عکس ازطریق فتوشاپ وجود د ...
Raspberry Pi For Dummies, 3rd E ...
Get your slice of Raspberry Pi With the invention of the unique credit card-sized single-board computer comes a new wave of hardware geeks, hackers, a ...
Linux: The Ultimate Step by Ste ...
LINUX The Ultimate Step by Step Guide to Quickly and Easily Learning Linux This book is a precise yet comprehensive manual that includes all the tips, ...
2D Graphics Programming for Gam ...
The success of Angry Birds, Peggle, and Fruit Ninja has proven that fun and immersive game experiences can be created in two dimensions. Furthermore, ...
Logic, Language, Information, a ...
Edited in collaboration with FoLLI, the Association of Logic, Language and Information this book constitutes the refereed proceedings of the 20th Work ...
Database Systems
Database Systems: A Pragmatic Approach provides a comprehensive, yet concise introduction to database systems. It discusses the database as an essenti ...
Sams Teach Yourself Mac OS X Li ...
Sams Teach Yourself Mac OS X Lion in 10 Minutes offers straightforward, practical information designed to get you up and running quickly and easily. B ...
Information Security The Comple ...
Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information ...