mirror of
https://github.com/namibia/free-programming-books.git
synced 2024-11-23 12:02:01 +00:00
commit
d127f878f3
@ -21,7 +21,7 @@
|
|||||||
* [Web Performance](#web-performance)
|
* [Web Performance](#web-performance)
|
||||||
* [MOOC](#mooc)
|
* [MOOC](#mooc)
|
||||||
* [Professional Development](#professional-development)
|
* [Professional Development](#professional-development)
|
||||||
* [Cryptography](#cryptography)
|
* [Security](#security)
|
||||||
* [Ada](#ada)
|
* [Ada](#ada)
|
||||||
* [Agda](#agda)
|
* [Agda](#agda)
|
||||||
* [Android](#android)
|
* [Android](#android)
|
||||||
@ -109,7 +109,6 @@
|
|||||||
* [Scheme](#scheme)
|
* [Scheme](#scheme)
|
||||||
* [Scilab](#scilab)
|
* [Scilab](#scilab)
|
||||||
* [Scratch](#scratch)
|
* [Scratch](#scratch)
|
||||||
* [Security](#security)
|
|
||||||
* [Sed](#sed)
|
* [Sed](#sed)
|
||||||
* [Silverlight](#silverlight)
|
* [Silverlight](#silverlight)
|
||||||
* [Smalltalk](#smalltalk)
|
* [Smalltalk](#smalltalk)
|
||||||
@ -386,8 +385,12 @@
|
|||||||
* [Confessions of an IT Manager](http://download.red-gate.com/ebooks/DotNet/Confessions_IT_Manager.zip) *(RedGate, By Phil Factor)*
|
* [Confessions of an IT Manager](http://download.red-gate.com/ebooks/DotNet/Confessions_IT_Manager.zip) *(RedGate, By Phil Factor)*
|
||||||
* [How to be a Programmer: A Short, Comprehensive, and Personal Summary] (http://samizdat.mines.edu/howto/HowToBeAProgrammer.html) by Robert L. Read
|
* [How to be a Programmer: A Short, Comprehensive, and Personal Summary] (http://samizdat.mines.edu/howto/HowToBeAProgrammer.html) by Robert L. Read
|
||||||
|
|
||||||
####Cryptography
|
####Security
|
||||||
* [Handbook of Applied Cryptography](http://cacr.uwaterloo.ca/hac/index.html)
|
* [Handbook of Applied Cryptography](http://cacr.uwaterloo.ca/hac/index.html)
|
||||||
|
* [OWASP Top 10 for .NET Developers](http://www.troyhunt.com/2011/12/free-ebook-owasp-top-10-for-net.html)
|
||||||
|
* [Intrusion Detection Systems with Snort](http://ptgmedia.pearsoncmg.com/images/0131407333/downloads/0131407333.pdf)
|
||||||
|
* [Security Engineering](http://www.cl.cam.ac.uk/~rja14/book.html)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
###Ada
|
###Ada
|
||||||
@ -1140,10 +1143,6 @@ See also [TeX](#tex)
|
|||||||
###Scratch
|
###Scratch
|
||||||
* [Computer Science Concepts in Scratch](http://stwww.weizmann.ac.il/g-cs/scratch/scratch_en.html)
|
* [Computer Science Concepts in Scratch](http://stwww.weizmann.ac.il/g-cs/scratch/scratch_en.html)
|
||||||
|
|
||||||
###Security
|
|
||||||
* [OWASP Top 10 for .NET Developers](http://www.troyhunt.com/2011/12/free-ebook-owasp-top-10-for-net.html)
|
|
||||||
* [Intrusion Detection Systems with Snort](http://ptgmedia.pearsoncmg.com/images/0131407333/downloads/0131407333.pdf)
|
|
||||||
|
|
||||||
###Sed
|
###Sed
|
||||||
* [Sed - An Introduction and Tutorial](http://www.grymoire.com/Unix/Sed.html)
|
* [Sed - An Introduction and Tutorial](http://www.grymoire.com/Unix/Sed.html)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user