Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
HP-UX 11i Tuning and Performance (2nd Edition)
HP-UX 11i Tuning and Performance (2nd Edition)

Maximizing the performance of Unix systems is a challenge that requires a specialized understanding of operating system behavior, knowledge of the design and tuning capabilities of the applications that run on the system, and an intimate acquaintance with system and application performance measuring tools that assist in...

Visual Basic .NET Class Design Handbook: Coding Effective Classes (Expert's Voice)
Visual Basic .NET Class Design Handbook: Coding Effective Classes (Expert's Voice)
Ask anybody who's heard a bit about Visual Basic .NET what the biggest change over Visual Basic 6 is, and chances are they'll say 'object orientation'. But what does this mean? Visual Basic has been, to some extent, object-oriented since VB5, so what's so groundbreaking about the .NET incarnation? Well, most...
Mastering AutoCAD Civil 3D 2016: Autodesk Official Press
Mastering AutoCAD Civil 3D 2016: Autodesk Official Press

Utilize AutoCAD Civil 3D 2016 for a real-world workflow with these expert tricks and tips

Mastering AutoCAD Civil 3D 2016 is a complete, detailed reference and tutorial for Autodesk's extremely popular and robust civil engineering software. With straightforward explanations, real-world...

UMTS Performance Measurement: A Practical Guide to KPIs for the UTRAN Environment
UMTS Performance Measurement: A Practical Guide to KPIs for the UTRAN Environment
Having dealt with in-depth analysis of SS#7, GSM and GPRS networks I started to monitor
UTRAN interfaces approximately four years ago. Monitoring interfaces means decoding
the data captured on the links and analysing how the different data segments and messages
are related to each other. In general I wanted to trace all messages
...
Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
Mastering phpMyAdmin 3.3.x for Effective MySQL Management
Mastering phpMyAdmin 3.3.x for Effective MySQL Management

phpMyAdmin is an open source tool written in PHP. It handles the administration of MySQL over the World Wide Web (WWW). It can perform various tasks, such as creating, modifying, or deleting databases, tables, fields, or rows. It can also execute SQL statements and manage users and their permissions. When it comes to exploiting phpMyAdmin to...

Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Customer Analytics For Dummies
Customer Analytics For Dummies

The easy way to grasp customer analytics

Ensuring your customers are having positive experiences with your company at all levels, including initial brand awareness and loyalty, is crucial to the success of your business. "Customer Analytics For Dummies" shows you how to measure each stage of the customer journey and use...

Oracle Business Intelligence 11g R1 Cookbook
Oracle Business Intelligence 11g R1 Cookbook

Here's an opportunity to learn all the key elements of the OBIEE 11g suite by doing tasks rather than just reading. Packed with practical recipes, it empowers you to create complex analytical reports with minimum effort.

Overview

  • Improve the productivity of business intelligence solution to satisfy...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Software Testing (2nd Edition)
Software Testing (2nd Edition)
Software Testing is the book for new or aspiring software testers interested in learning about this crucial part of the software development process. The complexity and size of today's software makes writing bug-free code extremely difficult, even for highly experienced programmers. Couple that with our increasing reliance on software for...
Exploratory Software Testing: Tips, Tricks, Tours, and Techniques to Guide Test Design
Exploratory Software Testing: Tips, Tricks, Tours, and Techniques to Guide Test Design

How to Find and Fix the Killer Software Bugs that Evade Conventional Testing

 

In Exploratory Software Testing, renowned software testing expert James Whittaker reveals the real causes of today’s most serious, well-hidden software...

unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy