Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PHP in a Nutshell
PHP in a Nutshell

Now installed on more than 20 million Internet domains around the world, PHP is an undisputed leader in web programming languages. Database connectivity, powerful extensions, and rich object-orientation are all reasons for its popularity, but nearly everyone would agree that, above all, PHP is one of the easiest languages to...

Practical Perforce
Practical Perforce

When developers build software, they're able to keep track of all the different versions and all the components they use with software configuration management (SCM) systems. One of the more popular SCM products is Perforce.

Authored by Perforce's own VP of product technology, ...

Linux Server Hacks, Volume Two : Tips & Tools for Connecting, Monitoring, and Troubleshooting
Linux Server Hacks, Volume Two : Tips & Tools for Connecting, Monitoring, and Troubleshooting

Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are...

Exploring the JDS Linux Desktop
Exploring the JDS Linux Desktop
The ideal guide to JDS, Exploring the JDS Linux Desktop is clear and direct, and carefully covers such housekeeping chores as setting up networking, updates, and backups. It enters into great depth concerning the key productivity tools every user needs: email, web browsing, instant messaging, word processing,...
Learning XML, Second Edition
Learning XML, Second Edition
In this new edition of the best selling title, the author explains the important and relevant XML technologies and their capabilities clearly and succinctly with plenty of real-life projects and useful examples. He outlines the elements of markup--demystifying concepts such as attributes, entities, and namespaces--and provides enough depth and...
High Performance MySQL
High Performance MySQL
In High Performance MySQL you will learn about MySQL indexing and optimization in depth so you can make better use of these key features. You will learn practical replication, backup, and load-balancing strategies with information that goes beyond available tools to discuss their effects in real-life...
Mac OS X for Java Geeks
Mac OS X for Java Geeks
Mac OS X for Java Geeks delivers a complete and detailed look at the Mac OS X platform, geared specifically at Java developers. Programmers using the 10.2 (Jaguar) release of Mac OS X, and the new JDK 1.4, have unprecedented new functionality available to them. Whether you are a Java newbie, working your way through...
Mac OS X Hacks
Mac OS X Hacks
Mac OS X Hacks reflects the real-world know how and experience of those well steeped in Unix history and expertise, sharing their no-nonsense, sometimes quick-and-dirty solutions to administering and taking full advantage of everything a Unix desktop has to offer: Web, Mail, and FTP serving, security services, SSH,...
Mastering Visual Studio .NET
Mastering Visual Studio .NET
Mastering Visual Studio .NET provides you, as an experienced programmer, with all the information needed to get the most out of the latest and greatest development tool from Microsoft®. Written by experienced developers and trainers John Flanders, Ian Griffiths, and Chris Sells, this book not only covers...
Junos Cookbook
Junos Cookbook

The Juniper Networks routing platforms are becoming the go-to solution for core, edge, metro and remote office networks, and JUNOS software is behind it all. The operating system is so full of industrial-strength routing protocols and IP innovations that those treading into the world of JUNOS will need clarification,...

Running Linux
Running Linux

You may be contemplating your first Linux installation. Or you may have been using Linux for years and need to know more about adding a network printer or setting up an FTP server. Running Linux, now in its fifth edition, is the book you'll want on hand in either case. Widely recognized in the...

Network Security Assessment
Network Security Assessment
Network Security Assessment offers an efficient testing model you can adopt, refine, and reuse to create proactive defensive strategies to protect your systems from the threats that are out there, as well as those still being developed. This thorough and insightful guide covers offensive technologies by...
unlimited object storage image
Result Page: 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy