Unlock C# functional programming
This course provides beginning to intermediate C++ developers with the knowledge required for up-to-date C++ programming. It begins by introducing the concepts of design patterns and idioms, outlining their usefulness, and demonstrating some traditional C++ implementations using pointers and manual memory management.
Create innovative and addictive games with C++
EC-Council's Ethical Hacking and Countermeasures (CEH) covers concepts and tools related to exploiting systems, networks, devices and operating platforms. This includes hacking concepts such as vulnerability assessment, network intrusion, reverse engineering, defacing websites, damaging network appliances, launching distributed denial-of-service attacks, massive worm propagation, breaking passwords, brute-forcing authentication systems, cracking encryption, exploiting systems, advance viruses, Trojans, and other malware. This certificate is targeted at site administrators, security professionals, auditors and anyone who is concerned about the integrity of the network infrastructure.
Learn C++ from scratch and get started building your very own games.
C# 6 Fundamentals LiveLessons Part I: Introduction is the new C# video from expert trainer Paul Deitel. This video is an introduction to developing applications in the C# 6 programming language. You begin by exploring the Visual Studio IDE. Then you learn about core C# constructs, including classes and objects. You move on to explore program control, and end with a deep exploration of methods in C#.
This course is the beginning track for certification. It is designed for the beginning C# programmer although there are topics of an advanced nature. The topics discussed within this curriculum focus primarily on C# code and not interface design or true event-based programming.
These videos are companion files meant to be used with the book: Learn C the Hard Way.
This is the first of a four-part series designed to help you prepare for the International Council of E-Commerce Consultant's Certified Ethical Hacker (CEH) exam. This course focuses on several key areas of knowledge tested in that exam: You will learn how to perform reconnaissance on companies, networks, systems, and people; how to conduct footprinting; how to exercise resource enumeration; how to sniff networks and scan them in order to better understand the attack landscape; and how to ethically gain access to systems, networks and data.