Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a …
For weeks, months —nay!—from the very moment you were born, you’ve felt it calling to you. At long last you’ll …
A uniquely goblal yet concise survey of the role played by sin and salvation in all the major world faiths.
Written in Packt's Beginner's Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks …
Managing projects across an organization is complex. This book guides you through each twist and turn in the project lifecycle …
Piggy-cide: The deliberate and unlawful killing of a ceramic piggybank; onset by financial hardship and multi-hour commutes to an unfulfilling …
Unlock the more straightforward side of The Leopard with this concise and insightful summary and analysis!This engaging summary presents an …
Advance in your product management career and create innovative products that customers love! Regardless of industry or sector, to compete …
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life …
Does technology actually matter? And how can we apply technology to drive business value? For years, we've been told that …
This book includes selected papers of the First International Workshop on Model-Based Software and Data Integration 2008, held in Berlin, …
To get the most out of modern JavaScript, you need learn the latest features of its parent specification, ECMAScript 6 …
The concept of the Sublime has influenced aesthetic and theoretical debate ever since it was first widely invoked in the …
Quantum computing is a beautiful fusion of quantum physics with computer science. It incorporates some of the most stunning ideas …
This textbook offers a unified, self-contained introduction to the field of term rewriting. Baader and Nipkow cover all the basic …
Legend has it that Google deploys over two billion application containers a week. How's that possible? Google revealed the secret …
This volume completes Keith McMahon's acclaimed history of imperial wives and royal polygamy in China. Avoiding the stereotype of the …
The Entrepreneur's Guide to Customer Development is bundled with a pre-order of Brant's and Patrick's next book, The Lean Entrepreneur. …
Great for the Vintage GamePlayer
The social acceptance of tobacco use obscures the fact that it is the single greatest preventable cause of death in …
This book is required reading for anyone working with accelerator-based computing systems. " From the Foreword by Jack Dongarra, University …
What Works in Corrections, first published in 2006, examines the impact of correctional interventions, management policies, treatment and rehabilitation programs …
Kanban is becoming a popular way to visualize and limit work-in-progress in software development and information technology work. Teams around …
10 books in 1 - your key to networking success! Your one-stop guide to the latest updates on networking Packed …
At the time of his death in 2004, Jacques Derrida was arguably the most influential and the most controversial thinker …
Applying design patterns to JavaScript code creates more reliable and maintainable code. In this book, you will explore different design …
One of the world's most renowned pick-up artists shares his secrets for approaching, attracting, and enjoying intimate relationships with beautiful …
Designing distributed computing systems is a complex process requiring a solid understanding of the design problems and the theoretical and …
In the present thriving global economy a need has evolved for complex data analysis to enhance an organization’s production systems, …