Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Visual Studio Code Distilled: Evolved Code Editing for Windows, macOS, and Linux
Visual Studio Code Distilled: Evolved Code Editing for Windows, macOS, and Linux

Use Visual Studio Code to write and debug code quickly and efficiently on any platform, for any device, using any programming language, and on the operating system of your choice.

Visual Studio Code is an open source and cross-platform development tool that focuses on code editing across a variety of development...

Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
Microprocessor Design: A Practical Guide from Design Planning to Manufacturing (Professional Engineering)
Microprocessor Design: A Practical Guide from Design Planning to Manufacturing (Professional Engineering)

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Gain a Working Knowledge of the Entire Microprocessor Design Flow

This unique step-by-step guide is...

Continuous Delivery and DevOps: A Quickstart guide
Continuous Delivery and DevOps: A Quickstart guide

Streamline and optimize your workflow with this fast and engaging guide to continuous delivery and DevOps. Delivering quality software every time will become a way of life.

Overview

  • Real world and realistic examples of how to go about implementing continuous delivery and DevOps
  • Learn...
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

High Impact Data Visualization with Power View, Power Map, and Power BI
High Impact Data Visualization with Power View, Power Map, and Power BI

High Impact Data Visualization with Power View, Power Map, and Power BI helps you take business intelligence delivery to a new level that is interactive, engaging, even fun, all while driving commercial success through sound decision-making. Learn to harness the power of Microsoft’s flagship, self-service business intelligence...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices....

IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking)
IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking)
The authoritative reference text on KAME and IPv6!

IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6
...
IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking)
IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking)
"I would purchase the books... since I am Ipv6 connected it would be a nice reference."..."I do think that if you buy one you will buy the other, assuming that the chapters are setup correctly." -Randall Stewart, Cisco Systems

"My immediate reaction was that I thought it would be better in one volume, BUT then I
...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Developing Enterprise iOS Applications: iPhone and iPad Apps for Companies and Organizations
Developing Enterprise iOS Applications: iPhone and iPad Apps for Companies and Organizations

If you plan to develop iOS applications in a corporate setting—for internal consumption or for sale to end users—you need to read this book. Veteran developer James Turner shares best practices and lessons learned from his recent on-the-ground experience planning, building, and shipping an iOS application in an enterprise...

Result Page: 100 99 98 97 96 95 94 93 92 91 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy