Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
DB2(R) Universal Database V8 Handbook for Windows, UNIX, and Linux
DB2(R) Universal Database V8 Handbook for Windows, UNIX, and Linux
IBM DB2 Universal Database V8 offers breakthrough availability, manageability, performance, and scalability. Now, straight from IBM, there's a start-to-finish guide to DB2 Universal Database V8 administration and development for UNIX, Linux, and Windows.

This definitive reference covers every aspect of deploying and managing DB2 Universal...

Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach
Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach

This book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment

Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book...

Practical Machine Learning with Python: A Problem-Solver's Guide to Building Real-World Intelligent Systems
Practical Machine Learning with Python: A Problem-Solver's Guide to Building Real-World Intelligent Systems

Master the essential skills needed to recognize and solve complex problems with machine learning and deep learning. Using real-world examples that leverage the popular Python machine learning ecosystem, this book is your perfect companion for learning the art and science of machine learning to become a successful practitioner....

Improving Web Application Security: Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures

This guide helps you to design, build, and configure hack-resilient Web applications. These are applications that reduce the likelihood of successful attacks and mitigate the extent of damage should an attack occur. This guide uses a three-layered approach: securing the network, securing the host, and securing the application. This guide...

Pro OpenSSH
Pro OpenSSH

SSH, or Secure Shell, is the de facto standard among users and administrators who wish to establish secure communication between disparate networks. This book is authored by a Fortune 100 system administrator, who will provide you with a highly practical reference for configuring and deploying OpenSSH in your own environment.

Some of the...

The Rails Way (Addison-Wesley Professional Ruby Series)
The Rails Way (Addison-Wesley Professional Ruby Series)
The expert guide to building Ruby on Rails applications

 

Ruby on Rails strips complexity from the development process, enabling professional developers to focus on what matters most: delivering business value. Now, for the first time, there’s a comprehensive,...

Sams Teach Yourself Linux Security Basics in 24 Hours
Sams Teach Yourself Linux Security Basics in 24 Hours
This book is an introductory, tutorial-style text designed to give the reader a strong foundational knowledge of securing a Linux system. This book teaches the reader how to securely install and run Linux as it comes shipped from most Linux distributors. Most other titles in this market focus on the use of tools and software not normally included...
Expert WSS 3.0 and MOSS 2007 Programming (Wrox Programmer to Programmer)
Expert WSS 3.0 and MOSS 2007 Programming (Wrox Programmer to Programmer)
Expert WSS 3.0 and MOSS 2007 Programming

Providing you with in-depth coverage of the WSS 3.0 and MOSS 2007 development framework, this book shares step-by-step recipes and real-world examples to help you develop the skills you need to become a proficient WSS 3.0 and MOSS 2007 developer.

Code-walkthroughs and in-depth...

Rhomobile Beginner's Guide
Rhomobile Beginner's Guide

The Rhomobile Beginner's guide will speak to every developer's mind, and especially to the technocrats looking for a reliable cross-platform framework encouraging them to explore and try out these wonderful products by Rhomobile. This book guides you step by step to build an enterprise mobile application from scratch, through to...

Easy Web Development with WaveMaker
Easy Web Development with WaveMaker

Developers of all levels can now easily develop custom, responsive, and rich web application clients with secure, scalable servers utilizing relational databases and RESTful services using WaveMaker Studio. Whether you need a departmental business application or a form application for your weekend club, this book will show you how to design,...

React 16 Tooling: Master essential cutting-edge tools, such as create-react-app, Jest, and Flow
React 16 Tooling: Master essential cutting-edge tools, such as create-react-app, Jest, and Flow

React 16 Tooling covers the most important tools, utilities, and libraries that every React developer needs to know - in detail.

Key Features

  • Each chapter presents meta-development solutions to help React developers
  • The tools used are presented in a practical,...
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
unlimited object storage image
Result Page: 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy