Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Exploring Java 9: Build Modularized Applications in Java
Exploring Java 9: Build Modularized Applications in Java
Discover all the new features and changes in Java 9, including module systems―JPMS or Project Jigsaw. This book covers the whole Java application development life cycle. You'll review all the important concepts, including module descriptor, unnamed module, automatic module, and command line tools. 

C++ Toolkit for Engineers and Scientists
C++ Toolkit for Engineers and Scientists
This concise guide covers the fundamental aspects of the numerical analysis, basing upon it the construction of its routines for solving nonlinear equations, linear and nonlinear systems of equations, and eigenvalue problems. Focusing on software development, this book emphasizes software tools, OOP techniques for handling vectors, polynomials,...
Raspberry Pi Robotic Projects
Raspberry Pi Robotic Projects

Enter the wonderful world of Robotics via Raspberry Pi. Unlock the massive potential of this tiny PC with a step by step guide that will teach you everything from voice recognition to wireless control. Have fun!

Overview

  • Make your projects talk and understand speech with Raspberry Pi
  • Use...
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results

The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.

Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This...

Industrial Problem Solving Simplified: An 8-Step Program
Industrial Problem Solving Simplified: An 8-Step Program

Industrial Problem Solving Simplified provides a roadmap for solving manufacturing problems. Containing numerous examples of actual problems and their solutions in various industrial environments, it is for novice as well as experienced manufacturing owners, managers, quality representatives, consultants, trainers, and procurement...

Java Data Science Cookbook
Java Data Science Cookbook

Key Features

  • This book provides modern recipes in small steps to help an apprentice cook become a master chef in data science
  • Use these recipes to obtain, clean, analyze, and learn from your data
  • Learn how to get your data science applications to production and enterprise...
PMP® Exam Practice Test and Study Guide, Ninth Edition (ESI International Project Management Series)
PMP® Exam Practice Test and Study Guide, Ninth Edition (ESI International Project Management Series)

PMP® Exam: Practice Test and Study Guide, Ninth Edition uses self-study to help readers increase their chances of passing the PMP certification exam the first time. This spiral-bound edition includes 40 multiple-choice practice questions in each of the ten knowledge areas and in the...

Hands-On Database
Hands-On Database

Many students taking an introductory database course need hands-on experience.

Typically, they are under pressure to finish quickly with a certificate or degree and get to work. They need to get actual practice in the process of designing and developing databases that they can apply in their future employment. They need to create...

Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Packet Guide to Core Network Protocols
Packet Guide to Core Network Protocols

Trying to find the perfect networking resource or textbook can be a real challenge. Sometimes they are extremely focused on one technology, and thus miss the mark. Or they are extremely broad, covering every networking idea known to man. This book is about something that all networks have in common—the core protocols. Networks...

Result Page: 65 64 63 62 61 60 59 58 57 56 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy