Home | Amazing | Today | Tags | Publishers | Years | Search 
Key Nursing Skills
Key Nursing Skills

Written by authors have a wide experience in teaching and practicing adult nursing, Key Nursing Skills will be invaluable to nurses who really want to get to grips with the more common procedures.

Each chapter focuses on a specific area of care and related skills and considers the main practice issues. Each intervention is...

Developer Testing: Building Quality into Software (Addison-Wesley Signature Series (Cohn))
Developer Testing: Building Quality into Software (Addison-Wesley Signature Series (Cohn))

How do successful agile teams deliver bug-free, maintainable software—iteration after iteration? The answer is: By seamlessly combining development and testing. On such teams, the developers write testable code that enables them to verify it using various types of...

Mastering Embedded Linux Programming
Mastering Embedded Linux Programming

Key Features

  • Create efficient and secure embedded devices using Linux
  • Minimize project costs by using open source tools and programs
  • Explore each component technology in depth, using sample implementations as a guide

Book Description

Mastering Embedded Linux...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Learning Behavior-driven Development with JavaScript
Learning Behavior-driven Development with JavaScript

Create powerful yet simple-to-code BDD test suites in JavaScript using the most popular tools in the community

About This Book

  • Master the most popular testing tools in the JavaScript ecosystem, such as CucumberJS, Mocha, SinonJS, and more.
  • Learn how Behavior-driven development can help...
Microservices From Day One: Build robust and scalable software from the start
Microservices From Day One: Build robust and scalable software from the start

Learn what a microservices architecture is, its advantages, and why you should consider using one when starting a new application. The book describes how taking a microservices approach from the start helps avoid the complexity and expense of moving to a service-oriented approach after applications reach a critical code base size or...

Stack Frames: A Look From Inside
Stack Frames: A Look From Inside

Teaches you exactly how program memory content and organization is vital for computer security, especially Unix-like operating systems. You will learn how it is manipulated to take control of a computer system, as well as the countermeasures that system designers set up to avoid this. Neither a guide for hackers nor an all-out theory book,...

Creating Blogs with Jekyll
Creating Blogs with Jekyll

Learn to create your own blog using the Jekyll static site generator. You’ll start with a simple template, add new features to it, automate any maintenance, attach social sharing, and begin writing. By the end of Creating Blogs with Jekyll, you will be able to create custom blogs with Jekyll, update the content with ease, and...

Oracle Application Express Administration: For DBAs and Developers
Oracle Application Express Administration: For DBAs and Developers

Succeed in managing Oracle Application Express (APEX) environments. This book focuses on creating the right combination of scalability, high-availability, backup and recovery, integrity, and resource control. The book covers everything from simple to enterprise-class deployments, with emphasis on enterprise-level requirements and coverage of...

The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

Medicine and Victory: British Military Medicine in the Second World War
Medicine and Victory: British Military Medicine in the Second World War

Medicine and Victory is the first comprehensive account of British military medicine in the Second World War since the publication of the official history in the early 1950s. Drawing on a wide range of official and non-official sources, the book examines medical work in all the main theatres of the war, from the front line to the...

Mastering matplotlib
Mastering matplotlib

A practical guide that takes you beyond the basics of matplotlib and gives solutions to plot complex data

About This Book

  • Customize, configure, and handle events, and interact with figures using matplotlib
  • Create highly intricate and complicated graphs using matplotlib
  • ...
Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy