Key FeaturesLearn everything about your iPhone quickly to use it as an effective tool for communication, entertainment, and workCustomize your phone's look and sound and modify the iOS's privacy settingsKeep your apps tidy and organized using the App LibraryBook DescriptionThe iPhone is the most popular smartphone available on the market, renowned for its sophisticated design, immersive UI, and user safety.
The most comprehensive guide to ethical hacking and penetration testing with Kali Linux, from beginner to professionalKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using advanced real-life hacker techniquesUse Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environmentPurchase of the print or Kindle book includes a free eBook in the PDF formatBook DescriptionKali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry.
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.
This book presents cutting-edge research, advanced techniques, and practical applications of the integration of Cloud Computing and Internet of Things (IoT).
The Eclipse environment solves the problem of having to maintain your own Integrated Development Environment (IDE), which is time consuming and costly.
This entirely revised second edition of Engineering a Compiler is full of technical updates and new material covering the latest developments in compiler technology.
Building Intelligent Interactive Tutors discusses educational systems that assess a student's knowledge and are adaptive to a student's learning needs.
Get a practical, hands-on introduction to the Haskell language, its libraries and environment, and to the functional programming paradigm that is fast growing in importance in the software industry.
This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills.
This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills.
Evaluating Children's Interactive Products directly addresses the need to ensure that interactive products designed for children - whether toys, games, educational products, or websites - are safe, effective, and entertaining.
Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure.
Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks.
Completely updated for this exciting third edition, Beginning Ubuntu for Windows and Mac Users will help you start your journey into Free and Open Source Software with Ubuntu 22.
Explore Automated Market Makers (AMMs), the underlying protocols used by decentralized exchanges (DEX) to allow users to perform trades of cryptocurrencies in a decentralized way with no middlemen.
Keeping Found Things Found: The Study and Practice of Personal Information Management is the first comprehensive book on new 'favorite child' of R&D at Microsoft and elsewhere, personal information management (PIM).
The Perfect Reference for the Multitasked SysAdminThe Microsoft Windows Vista operating system offers several changes and improvements over its predecessors.
Build and deploy scalable cloud applications using Windows containers and KubernetesKey FeaturesRun, deploy, and orchestrate containers on the Windows platform with this Kubernetes bookUse Microsoft SQL Server 2019 as a data store to deploy Kubernetes applications written in .
This book presents an overview of the blockchain-based Internet of Things systems, along with the opportunities, challenges, and solutions in diverse fields such as business, education, agriculture, and healthcare.
Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone.
Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release.
Master best practices for success with all aspects of Azure cloud storage For cloud environments to operate and scale as they should, their storage components must be designed and configured well.
Create a mobile app for Apple platforms using SwiftUI in conjunction with Google's Firebase backend to post and retrieve data, authenticate users, and store data securely.
In recent years, soft computing techniques have emerged as a successful tool to understand and analyze the collective behavior of service- oriented computing software.
See MIPS Run, Second Edition, is not only a thorough update of the first edition, it is also a marriage of the best-known RISC architecture--MIPS--with the best-known open-source OS--Linux.
The CompTIA Linux+ Certification"e; book - the ultimate guide to mastering Linux system administration in preparation for the CompTIA Linux+ Certification.