Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Continuous Delivery and DevOps: A Quickstart guide
Continuous Delivery and DevOps: A Quickstart guide

Streamline and optimize your workflow with this fast and engaging guide to continuous delivery and DevOps. Delivering quality software every time will become a way of life.

Overview

  • Real world and realistic examples of how to go about implementing continuous delivery and DevOps
  • Learn...
Block Trace Analysis and Storage System Optimization: A Practical Approach with MATLAB/Python Tools
Block Trace Analysis and Storage System Optimization: A Practical Approach with MATLAB/Python Tools
Understand the fundamental factors of data storage system performance and master an essential analytical skill using block trace via applications such as MATLAB and Python tools. You will increase your productivity and learn the best techniques for doing specific tasks (such as analyzing the IO pattern in a quantitative way, identifying...
Learn SQL Server Administration in a Month of Lunches: Covers Microsoft SQL Server 2005-2014
Learn SQL Server Administration in a Month of Lunches: Covers Microsoft SQL Server 2005-2014

Summary

Learn SQL Server Administration in a Month of Lunches is the perfect way to get started with SQL Server operations, including maintenance, backup and recovery, high availability, and performance monitoring. In about an hour a day over a month, you'll learn exactly what you can do, and what you...

Advanced PIC Microcontroller Projects in C: From USB to RTOS with the PIC 18F Series
Advanced PIC Microcontroller Projects in C: From USB to RTOS with the PIC 18F Series
This book is ideal for the engineer, technician, hobbyist and student who have knowledge of the basic principles of PIC microcontrollers and want to develop more advanced applications using the 18F series.

The architecture of the PIC 18FXXX series as well as typical oscillator, reset, memory, and input-output circuits is completely
...
Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

2D Unity: Your First Game from Start to Finish
2D Unity: Your First Game from Start to Finish

Have you ever wanted to make a video game, but didn't know where to start? 2D Unity is an approachable guide to making your own games using Unity, the powerful, free-to-use development platform.

2D Unity contains hands-on projects that get you started making games from the ground-up. Unity's complex...

Designing Embedded Systems with PIC Microcontrollers, Second Edition: Principles and Applications
Designing Embedded Systems with PIC Microcontrollers, Second Edition: Principles and Applications

PIC microcontrollers are used worldwide in commercial and industrial devices. The 8-bit PIC which this book focuses on is a versatile work horse that completes many designs. An engineer working with applications that include a microcontroller will no doubt come across the PIC sooner rather than later. It is a must to have a working knowledge...

Big Think Strategy: How to Leverage Bold Ideas and Leave Small Thinking Behind
Big Think Strategy: How to Leverage Bold Ideas and Leave Small Thinking Behind

Business leaders need bold strategies to stay relevant and win. In "Big Think Strategy", Schmitt shows how to bring bold thinking into your business by sourcing big ideas and executing them creatively. With the tools in this book, any leader can overcome institutionalized 'small think' - the inertia, the narrow-mindedness,...

Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...

Automatic Algorithm Recognition and Replacement: A New Approach to Program Optimization
Automatic Algorithm Recognition and Replacement: A New Approach to Program Optimization
Optimizing compilers have a fundamental problem. No matter how powerful their optimizations
are, they are no substitute for good application algorithms. Consider the case of
sorting. For sufficiently large data sets, a merge sort algorithm compiled with a less powerful
optimizer will always out-perform a selection sort algorithm
...
Programmable Logic Controllers, Sixth Edition
Programmable Logic Controllers, Sixth Edition

This textbook, now in its sixth edition, continues to be straightforward and easy-to-read, presenting the principles of PLCs while not tying itself to one manufacturer or another. Extensive examples and chapter ending problems utilize several popular PLCs, highlighting understanding of fundamentals that can be used regardless...

High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)
High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)

Progress in biology is dependent on the ability to observe, measure, and model the behavior of organisms at multiple levels of abstraction, from the microscopic to the macroscopic. There has been a tremendous growth recently in the techniques to probe the structure and workings of cellular and organ-level mechanisms. Significant advances have...

Result Page: 28 27 26 25 24 23 22 21 20 19 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy