Ebooki - "Ebooki promise"
Znalazłem 50+ ebooków pasujących do zapytania:

-45% na Biblioteka jQuery. Sprawdzone wzorce projektowe Jeszcze w promocji -45%
Thodoris Greasidis, Grudzień 2016 , 216 stron
Zobacz ebooka EbookpointHelion
...bieranie zdarzeń Tworzenie abstrakcji złożonych interfejsów API Izolowanie procedury generowania złożonych części aplikacji Interfejsy API Deferred i Promises Tworzenie szablonów klienckich jQuery — maksymalna efektywność wdrożeń o dużej skali! Thodoris Greasidis pochodzi z Grecji. Jest proje...
Oryginalny tytuł: jQuery Design Patterns, Tłumaczy: Piotr Pilch, ISBN: 978-83-283-2833-4

-45% na Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków Jeszcze w promocji -45%
William Mougayar, Vitalik Buterin, Styczeń 2019 , 208 stron
Zobacz ebooka EbookpointHelion
...Internet całkowicie zmienił naszą cywilizację. Podobnym przełomem jest technologia blockchain (łańcuch bloków), która permanentnie rejestruje transakcje w taki sposób, że nie da się ich usunąć, lecz tylko można je sekwencyjnie aktualizować, tworząc w istocie niekończący się zapis historii. Ta poz...
Oryginalny tytuł: The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology, Tłumaczy: Leszek Sielicki, ISBN: 978-83-283-4933-9

-45% na Cierpienia młodego Wertera Jeszcze w promocji -45%
Johann Wolfgang von Goethe, Kwiecień 2016 , 465 stron
Zobacz ebooka EbookpointHelion
...ows_of_Young_Werther) Werther et Charlotte se rencontrent un bal et tombent amoureux. Werther pense quil passera sa vie avec cette femme, mais Charlotte est promise un autre homme, Albert. Les deux hommes se rencontrent, et Werther se rend compte des qualités dAlbert : il senfuit pour tenter doublier Charlotte, et...
ISBN: 978-83-795-0225-7

-20% na The Polish Quarterly of International Affairs nr 2/2015
Natalie Brack, Ladislav Cabada, Ryszarda Formuszewicz, Niklas Bolin, Jeffrey Stevenson Murer, Renaud Thillaye, Claudia Chwalisz, Karol Chwedczuk-Szulc, Mateusz Zaremba, Szymon Bachrynowski, Stefan Mercier, Robert Ford, Kacper Rekawek, Kwiecień 2016 , 178 stron
Zobacz ebooka EbookpointHelion
...Articles Nathalie Brack Radical and Populist Eurosceptic Parties at the 2014 European Elections: A Storm in a Teacup? The integration process has now entered a new and more difficult phase characterised by mass Euroscepticism and the rise of radical and populist parties. Against the backdrop of the economic crisis, E...
ISBN: 1230-4999

-15% na Daremne piękna - Beauties in vain
Eryk Ostrowski, Maj 2012 , 65 stron
Zobacz ebooka EbookpointHelion
...d devoid of feelings" Jozef Kurylak Czytelnik znajdzie tu także ich wersje anglojęzyczne w tłumaczeniu Anny Ostrowskiej-Paton. Spis treści: OBIETNICA THE PROMISE 1. W miejscach piękniejszych niż te, które nam kiedykolwiek obiecano 1. In the places even more beautiful than had been promised to us 2. Tam gdzie...
ISBN: 978-83-611-8445-4

-15% na Codename: Panzers - Zimna Wojna - poradnik do gry
Jacek "Stranger" Hałas, Styczeń 2009 , 237 stron
Zobacz ebooka EbookpointHelion
...Misja 4 - The Great Divide (mapa)-[Akt 1\ Misja 4 - The Great Divide (cz.1)-[Akt 1\ Misja 4 - The Great Divide (cz.2)-[Akt 1\ Misja 5 - Promises to Keep (mapa)-[...\ liczba wszystkich rozdziałów: 62Informacja o grzeRTS, którego akcja osadzona jest w realiach Zimnej Wojny. Stajemy się akt...
ISBN: 978-83-8054-640-0

-15% na Joint Task Force - poradnik do gry
Andrzej "Rylak" Rylski, Styczeń 2006 , 93 stron
Zobacz ebooka EbookpointHelion
...son HarvestOperation Garden Light cz.1Operation Infinite Response cz.1Operation Eternal Guard cz.1Operation Intense HarvestOperation Urgent ArmsOperation Ghost Promise cz.2Informacja o grzeWojenny RTS od autorów znakomitego Nexus: The Jupiter Incident. Gra koncentruje się na taktycznej stronie starć i nie zawraca sobi...
ISBN: 978-83-8054-069-9

...sfully narrated the story keeping in mind the history of the time. If you love adventure stories then you simply cannot ignore this fast-moving adventure which promises to keep the reader engrossed from start-to-finish. The plot follows young David, who is cheated out of his inheritance by a greedy uncle, and kidnapped...
ISBN: 9788381153614

-15% na Zero Trust Networks. Building Secure Systems in Untrusted Networks
Evan Gilman, Doug Barth, Czerwiec 2017 , 240 stron
Zobacz ebooka EbookpointHelion
..., along with details necessary to implement it.The Zero Trust Model treats all hosts as if they...re internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, you...ll focus on building strong authentication, authorization, and encryption throughout, while providing compa...
ISBN: 978-14-919-6214-5

-15% na Practical Modern JavaScript. Dive into ES6 and the Future of JavaScript
Nicolas Bevacqua, Czerwiec 2017 , 334 stron
Zobacz ebooka EbookpointHelion
...ncluding arrow functions, destructuring, let and constClass syntax for declaring object prototypes, and the new Symbol primitiveHow to handle flow control with Promises, iterators, generators, and async functionsES6 collection built-in types for creating object maps and unique setsHow and when to use the new Proxy and...
ISBN: 978-14-919-4354-0

...ves a comfortable suburban life outside London, but feels old age and stodginess coming on and longs to have his mettle tested again. He gets his chance when a promise he made years ago in Rhodesia, to protect the son of an old acquaintance from a sinister conspiracy, and the action moves rapidly from England through t...
ISBN: 9788381157551

-20% na The Heritage of the Desert
Zane Grey, Sierpień 2017 , 272 stron
Zobacz ebooka EbookpointHelion
...not only recovers his health; he falls for Mescal in a big way. The greatest danger Hare faces though, is over Mescal, a half-Navajo shepherdess who is already promised in marriage to Naabs first-born son. The Mormon religion, however, demands that the girl shall become the second wife of one of the Mormons. Well, that...
ISBN: 9788381152396

-20% na The Polish Quarterly of International Affairs nr 1/2017
Piotr Kłodkowski, Agnieszka Szpak, Patryk Kugiel, Anna Maria Dyner, Andrzej Dybczyński, David Cadier, Beata Słomińska, Justyna Szałańska, Marek Wąsiński, Sierpień 2017 , 124 stron
Zobacz ebooka EbookpointHelion
...tical and Social Consequences in the Early 21st Century Indias political coherence largely depends on New Delhis ability to build a system of cross-cultural compromises among various communities. While the Muslim minority has lived and prospered in India for more than one thousand years, its relations with the Hindu ma...
ISBN: 1230-4999

-22% na Droga pogody ducha Jeszcze w promocji -22%
Jonathan Morris, Październik 2017 , 256 stron
Zobacz ebooka EbookpointHelion
...puje również jako ekspert w FOX News Channel i prowadzi katolicką audycję radiową. Jest autorem bestselleru New York TimesaGod Wants You Happy oraz książki The Promise: God's Purpose and Plan for When Life Hurts. Ta książka pomaga wyjaśnić, w jaki sposób możemy zacząć rozeznawać Bożą wolę w naszym życiu! Droga pogod...
Oryginalny tytuł: The Way of Serenity, Tłumaczy: Anna Wawrzyniak-Kędziorek, ISBN: 9788380651449

-15% na Product Management in Practice. A Real-World Guide to the Key Connective Role of the 21st Century
Matt LeMay, Listopad 2017 , 188 stron
Zobacz ebooka EbookpointHelion
...duct management is about building products that people love. The real-world practice of product management is often about difficult conversations, practical compromises, and hard-won incremental gains.In this book, author Matt LeMay focuses on the CORE connective skills-communication, organization, research, execution-...
ISBN: 978-14-919-8222-8

-20% na European Union Policies at a Time of Crisis
Tomasz Grzegorz Grosse, Listopad 2017 , 352 stron
Zobacz ebooka EbookpointHelion
...cope of the project required the knowledge of economics, history, political science, international relations, law and even sociology. The authors fulfill their promise to the readers: the volume contains a comprehensive and detailed elucidation of the influence of the crisis on the integration practice, and on the cont...
ISBN: 978-83-738-3826-0

-15% na Learning Perl 6. Keeping the Easy, Hard, and Impossible Within Reach
brian d foy, Sierpień 2018 , 476 stron
Zobacz ebooka EbookpointHelion
...s and directories and input/outputAssociatives, subroutines, classes, and rolesJunctions and setsRegular expressions and built-in grammarsConcurrency features: Promises, supplies, and channelsControlling external programs and other advanced features...
ISBN: 978-14-919-7764-4

-15% na The Enterprise Big Data Lake. Delivering the Promise of Big Data and Data Science
Alex Gorelik, Luty 2019 , 224 stron
Zobacz ebooka EbookpointHelion
...The data lake is a daring new approach for harnessing the power of big data technology and providing convenient self-service capabilities. But is it right for your company? This book is based on discussions with practitioners and executives from more than a hundred organizations, ranging from data-driven companies su...
ISBN: 978-14-919-3150-9

Mastering Kali Linux for Advanced Penetration Testing
Vijay Kumar Velu, Robert Beggs, Styczeń 2019 , 540 stron
Zobacz ebooka EbookpointHelion
...orks and data systems using wired and wireless networks as well as web services Identify and download valuable data from target systems Maintain access to compromised systems Use social engineering to compromise the weakest part of the network - the end users Who this book is for This third edition of Mastering Kali...
Oryginalny tytuł: Mastering Kali Linux for Advanced Penetration Testing, ISBN: 978-17-893-4061-7

...the many other features that modern JavaScript has to offer. As you progress through the chapters, you'll use asynchronous programming with callbacks and promises, handle browser events, and perform Document Object Model (DOM) manipulation. You'll also explore various methods of testing JavaScript projects. In th...
Oryginalny tytuł: Advanced JavaScript, ISBN: 978-17-898-0389-1

Mastering Hadoop 3
Chanchal Singh, Manish Kumar, Luty 2019 , 531 stron
Zobacz ebooka EbookpointHelion
...Description Apache Hadoop is one of the most popular big data solutions for distributed storage and for processing large chunks of data. With Hadoop 3, Apache promises to provide a high-performance, more fault-tolerant, and highly efficient big data processing platform, with a focus on improved scalability and increas...
Oryginalny tytuł: Mastering Hadoop 3, ISBN: 978-17-886-2832-7

Mastering Linux Security and Hardening
Donald A. Tevault, Styczeń 2018 , 367 stron
Zobacz ebooka EbookpointHelion
...A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.About This BookLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such as network service detection, user authentication, con...
Oryginalny tytuł: Mastering Linux Security and Hardening, ISBN: 978-17-886-2506-7

...erformance-tuning tasksIn DetailMySQL is one of the most popular and widely used relational databases in the World today. The recently released MySQL 8 version promises to be better and more efficient than ever before.This book contains everything you need to know to be the go-to person in your organization when it com...
Oryginalny tytuł: MySQL 8 Cookbook, ISBN: 978-17-883-9844-2

Cybersecurity Attack and Defense Strategies
Yuri Diogenes, Erdal Ozkaya, Styczeń 2018 , 368 stron
Zobacz ebooka EbookpointHelion
...and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system.In the next section,...
Oryginalny tytuł: Cybersecurity Attack and Defense Strategies, ISBN: 978-17-884-7385-9

Learn Ethical Hacking from Scratch
Zaid Sabih, Lipiec 2018 , 549 stron
Zobacz ebooka EbookpointHelion
...nd server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number...
Oryginalny tytuł: Learn Ethical Hacking from Scratch, ISBN: 978-17-886-2478-7

...nt to being able to create, maintain, deploy and test your own Node.js application.You will understand the importance of transitioning to functions that return Promise objects, and the difference between fs, fs/promises and fs-extra. With this book you'll learn how to use the HTTP Server and Client objects, data storag...
Oryginalny tytuł: Node.js Web Development, ISBN: 978-17-886-2736-8

Architecting Angular Applications with Redux, RxJS, and NgRx
Christoffer Noring, Marzec 2018 , 355 stron
Zobacz ebooka EbookpointHelion
...nd the one-way data flow and Flux pattern Work with functional programming and asynchronous data streams Figure out how RxJS can help us address the flaws in promises Set up different versions of cascading calls Explore advanced operators Get familiar with the Redux pattern and its principles Test and debug diffe...
Oryginalny tytuł: Architecting Angular Applications with Redux, RxJS, and NgRx, ISBN: 978-17-871-2175-1

...eatures Learn to write asynchronous code and improve the readability of your web applications Explore advanced concepts such as closures, Proxy, generators, Promise, async functions, and Atomics Use different design patterns to create structures to solve common organizational and processing issues Book Descript...
Oryginalny tytuł: ECMAScript Cookbook, ISBN: 978-17-886-2563-0

Google Cloud Platform Cookbook
Legorie Rajan PS, Kwiecień 2018 , 274 stron
Zobacz ebooka EbookpointHelion
...ures Implement Google Cloud services in your organization Leverage Google Cloud components to secure your organization's data A recipe-based guide that promises hands-on experience in deploying a highly scalable and available environment Book Description Google Cloud Platform is a cloud computing platform that...
Oryginalny tytuł: Google Cloud Platform Cookbook, ISBN: 978-17-882-9456-0

JavaScript and JSON Essentials
Sai S Sriparasa, BRUNO DMELLO, Kwiecień 2018 , 216 stron
Zobacz ebooka EbookpointHelion
...metadata for dependency managers, package managers, configuration managers, and metadata stores Handle asynchronous behavior in applications using callbacks, promises, generators, and async-await functions Use JSON for Angular 5, Node.js, Gulp.js, and Hapi.js Implement JSON as BSON in MongoDB Make use of JSON in d...
Oryginalny tytuł: JavaScript and JSON Essentials, ISBN: 978-17-886-2876-1

Penetration Testing with Shellcode
Hamza Megahed, Sierpień 2018 , 336 stron
Zobacz ebooka EbookpointHelion
...intermediate techniques, using real-world scenarios.By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and network level.Style and approachThis practical guide helps you understand buffer overflows and how to become creative...
Oryginalny tytuł: Penetration Testing with Shellcode, ISBN: 978-17-884-7559-4

Metasploit Penetration Testing Cookbook - Third Edition
Daniel Teixeira, Abhinav Singh, Monika Agarwal, Sierpień 2018 , 416 stron
Zobacz ebooka EbookpointHelion
...to create and customize payloads to evade anti-virus software and bypass an organization's defenses, exploit server vulnerabilities, attack client systems, compromise mobile phones, automate post exploitation, install backdoors, run keyloggers, highjack webcams, port public exploits to the framework, create your own m...
Oryginalny tytuł: Metasploit Penetration Testing Cookbook - Third Edition, ISBN: 978-17-886-2971-3

Machine Learning with Swift
Alexander Sosnovshchenko, Sierpień 2018 , 371 stron
Zobacz ebooka EbookpointHelion
...architectures of neural networks for iOS devicesTrain neural networks for image processing and natural language processingIn DetailMachine learning as a field promises to bring increased intelligence to the software by helping us learn and analyse information efficiently and discover certain patterns that humans canno...
Oryginalny tytuł: Machine Learning with Swift, ISBN: 978-17-871-2352-6

Kali Linux Web Penetration Testing Cookbook
Gilberto Najera-Gutierrez, Sierpień 2018 , 394 stron
Zobacz ebooka EbookpointHelion
...manual testing. You will also cover the use of vulnerability scanners and look at basic and advanced exploitation techniques that may lead to a full system compromise. You will start by setting up a testing laboratory, exploring the latest features of tools included in Kali Linux and performing a wide range of tasks w...
Oryginalny tytuł: Kali Linux Web Penetration Testing Cookbook, ISBN: 978-17-891-3417-9

Getting Started with Tableau 2018.x
Tristan Guillevin, Wrzesień 2018 , 387 stron
Zobacz ebooka EbookpointHelion
...Book Description Tableau is one of the leading business intelligence tools used worldwide, in organizations of every scale. In its latest release, Tableau 2018 promises richer and more useful features related to visual analytics, reporting, dashboarding, and a host of other data visualization aspects. Getting Started w...
Oryginalny tytuł: Getting Started with Tableau 2018.x, ISBN: 978-17-888-3997-6

Kali Linux 2018: Windows Penetration Testing
Wolf Halton, Bo Weaver, Październik 2018 , 396 stron
Zobacz ebooka EbookpointHelion
...s like Social Engineering Toolkit, and Metasploit, to exploit Windows vulnerabilities. Finally, you will learn how to gain full system-level access to your compromised system and then maintain that access. By the end of this book, you will be able to quickly pen test your system and network using easy-to-follow instru...
Oryginalny tytuł: Kali Linux 2018: Windows Penetration Testing, ISBN: 978-17-891-3077-5

Hands-On TypeScript for C# and .NET Core Developers
Francesco Abbruzzese, Październik 2018 , 449 stron
Zobacz ebooka EbookpointHelion
...eusable TypeScript libraries. Finally, you'll explore the features that TypeScript inherits from either ES6 or C#, or both of them, such as Symbols, Iterables, Promises, and Decorators. By the end of the book, you'll be able to apply all TypeScript concepts to understand the Angular framework better, and you'll have...
Oryginalny tytuł: Hands-On TypeScript for C# and .NET Core Developers, ISBN: 978-17-891-3332-5

...lusters on Amazon EC2 environments Implement best practices to improve efficiency and security of Kubernetes on the cloud Book Description Docker containers promise to radicalize the way developers and operations build, deploy, and manage applications running on the cloud. Kubernetes provides the orchestration tools...
Oryginalny tytuł: Kubernetes on AWS, ISBN: 978-17-883-9235-8

Practical Internet of Things Security
Brian Russell, Drew Van Duren, Listopad 2018 , 374 stron
Zobacz ebooka EbookpointHelion
...y, tracking issues, and countermeasures Design a fog computing architecture to support IoT edge analytics Detect and respond to IoT security incidents and compromises Who this book is for This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers)...
Oryginalny tytuł: Practical Internet of Things Security, ISBN: 978-17-886-2284-4

Hands-On Design Patterns with Swift
Florent Vilmart, Giordano Scalzo, Sergio De Simone, Grudzień 2018 , 401 stron
Zobacz ebooka EbookpointHelion
...dependency injection and functional reactive programming. Special emphasis will be given to techniques to handle concurrency, including callbacks, futures and promises, and reactive programming. These techniques will help you adopt a test-driven approach to your workflow in order to use Swift Package Manager and integ...
Oryginalny tytuł: Hands-On Design Patterns with Swift, ISBN: 978-17-891-3851-1

Learning Concurrent Programming in Scala - Second Edition
Aleksandar Prokopec, Luty 2017 , 426 stron
Zobacz ebooka EbookpointHelion
...or systemsBuild high-performance concurrent systems from simple, low-level concurrency primitivesExpress asynchrony in concurrent computations with futures and promisesSeamlessly accelerate sequential programs by using data-parallel collectionsDesign safe, scalable, and easy-to-comprehend in-memory transactional data m...
Oryginalny tytuł: Learning Concurrent Programming in Scala - Second Edition, ISBN: 978-17-864-6214-5

...Over 50 exciting and powerful recipes to help you unearth the promise of iOS programmingAbout This BookCreate high performance iOS apps with a focus on application development APIs and techniquesEnrich your UI skills with UIStoryboard, Autolayout, Size classes, and Container viewProduce enhanced results with iOS 10 a...
Oryginalny tytuł: iOS Programming Cookbook, ISBN: 978-17-864-6770-6

Kali Linux Intrusion and Exploitation Cookbook
Ishan Girdhar, Dhruv Shah, Kwiecień 2017 , 504 stron
Zobacz ebooka EbookpointHelion
...processesFamiliarize yourself with tools such as OPENVAS to locate system and network vulnerabilitiesDiscover multiple solutions to escalate privileges on a compromised machineIdentify security anomalies in order to make your infrastructure secure and further strengthen itAcquire the skills to prevent infrastructure an...
Oryginalny tytuł: Kali Linux Intrusion and Exploitation Cookbook, ISBN: 978-17-839-8217-2

...tail, covering attacks such as DDoS-based extortion, cryptoviruses, and ransomware. You will learn how to prevent such attacks and eliminate them if you are compromised. This book will help you become a pro at securing your data and preventing your organization from paying a hefty ransom.Style and approachThis step-by-...
Oryginalny tytuł: Preventing Digital Extortion, ISBN: 978-17-871-2597-1

Learning jQuery 3 - Fifth Edition
Adam Boduch, Jonathan Chaffer, Karl Swedberg, Maj 2017 , 437 stron
Zobacz ebooka EbookpointHelion
...we'll learn how the ECMAScript 6 features affect your web development process with jQuery. we'll discover how to use the newly introduced JavaScript promises and the new animation API in jQuery 3.0 in great detail, along with sample code and examples.By the end of the book, you will be able to successfully c...
Oryginalny tytuł: Learning jQuery 3 - Fifth Edition, ISBN: 978-17-858-8360-6

Mastering Kali Linux for Web Penetration Testing
Michael McPhee, Czerwiec 2017 , 332 stron
Zobacz ebooka EbookpointHelion
...roach. After establishing how to test these powerful tools safely, you will understand how to better identify vulnerabilities, position and deploy exploits, compromise authentication and authorization, and test the resilience and exposure applications possess.By the end of this book, you will be well-versed with the we...
Oryginalny tytuł: Mastering Kali Linux for Web Penetration Testing, ISBN: 978-17-843-9621-3

Learning Salesforce Einstein
Mohith Shrivastava, Czerwiec 2017 , 324 stron
Zobacz ebooka EbookpointHelion
...Salesforce reporting and Wave analyticsIn DetailDreamforce 16 brought forth the latest addition to the Salesforce platform: an AI tool named Einstein. Einstein promises to provide users of all Salesforce applications with a powerful platform to help them gain deep insights into the data they work on.This book will intr...
Oryginalny tytuł: Learning Salesforce Einstein, ISBN: 978-17-871-2528-5

...work for Java programming and with its latest update to 5.0, the framework is undergoing massive changes. Built to work with both Java 8 and Java 9, Spring 5.0 promises to simplify the way developers write code, while still being able to create robust, enterprise applications.If you want to learn how to get around the...
Oryginalny tytuł: Learning Spring 5.0, ISBN: 978-17-871-2624-4

Mastering Kali Linux for Advanced Penetration Testing - Second Edition
Vijay Kumar Velu, Czerwiec 2017 , 502 stron
Zobacz ebooka EbookpointHelion
...networks and data systems using wired and wireless networks as well as web servicesIdentify and download valuable data from target systemsMaintain access to compromised systemsUse social engineering to compromise the weakest part of the network—the end usersIn DetailThis book will take you, as a tester or securi...
Oryginalny tytuł: Mastering Kali Linux for Advanced Penetration Testing - Second Edition, ISBN: 978-17-871-2817-0

...client-side attacks. Moving on, you'll learn about web application security scanning and bypassing anti-virus and clearing traces on the target system post compromise. This book will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, hack, and secure netwo...
Oryginalny tytuł: Metasploit for Beginners, ISBN: 978-17-882-9986-2
Ebooki promise PDF, EPUB i MOBI Na Polishwords.com.pl