Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sams' Teach Yourself Linux in 24 Hours
Sams' Teach Yourself Linux in 24 Hours
While this guide won't make you an expert in Linux, it will explain how to get Red Hat Linux to work and how to do basic things with it. Organized into 24 lessons that take about an hour apiece, this book helps you ensure that your system can handle Linux and walks you through the process of installing Red Hat Linux and the Xfree86 windowing...
Introducing Microsoft  LINQ
Introducing Microsoft LINQ

Your first look at building data-rich applications using Microsoft LINQ.

Get a head start using Microsoft Language Integrated Query (LINQ). Two experienced developers give you advanced insights and expert guidance for using this unified model for data access. You will learn how to write queries in your native programming...

How to Do Everything with Photoshop CS2
How to Do Everything with Photoshop CS2
In this full-color, easy-to-use book, award-winning designer and best-selling author Colin Smith teaches the fundamentals of Photoshop then covers the more advanced features the software has to offer. Learn to use traditional drawing and painting tools ranging from pencils to airbrushes, then discover how to add and manipulate text, retouch photos,...
Inside Microsoft SQL Server 2008: T-SQL Querying
Inside Microsoft SQL Server 2008: T-SQL Querying

Tackle the toughest set-based querying and query tuning problems—guided by an author team with in-depth, inside knowledge of T-SQL. Deepen your understanding of architecture and internals—and gain practical approaches and advanced techniques to optimize your code’s performance.

Discover how to:

Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)
Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will...

High Impact Data Visualization with Power View, Power Map, and Power BI
High Impact Data Visualization with Power View, Power Map, and Power BI

High Impact Data Visualization with Power View, Power Map, and Power BI helps you take business intelligence delivery to a new level that is interactive, engaging, even fun, all while driving commercial success through sound decision-making. Learn to harness the power of Microsoft’s flagship, self-service business intelligence...

Introducing Elixir: Getting Started in Functional Programming
Introducing Elixir: Getting Started in Functional Programming

Elixir is an excellent language if you want to learn about functional programming, and with this hands-on introduction, you’ll discover just how powerful and fun Elixir can be. This language combines the robust functional programming of Erlang with a syntax similar to Ruby, and includes powerful features for...

Prototyping Essentials with Axure
Prototyping Essentials with Axure

A comprehensive strategy and planning guide for the production of world-class UX artifacts such as annotated wireframes, immersive prototypes, and detailed documentation with this book and ebook

Overview

  • Learn in a progressive and structured way to plan and construct highly compelling interactive,...
Branding For Dummies
Branding For Dummies

Discover how brands are created, managed, differentiated, leveraged, and licensed

Whether your business is large or small, global or local, this new edition of Branding For Dummies gives you the nuts and bolts to create, improve, and maintain a successful brand. It'll help you define your company's mission,...

Cancer Modelling and Simulation (Chapman & Hall/CRC Mathematical and Computational Biology)
Cancer Modelling and Simulation (Chapman & Hall/CRC Mathematical and Computational Biology)

Understanding how cancer tumours develop and spread is vital for finding treatments and cures. Cancer Modelling and Simulation demonstrates how mathematical modelling and computer simulation techniques are used to discover and gain insight into the dynamics of tumour development and growth. It highlights the benefits of tumour modelling, such...

Jira 8 Administration Cookbook: Over 90 recipes to administer, customize, and extend Jira Core and Jira Service Desk, 3rd Edition
Jira 8 Administration Cookbook: Over 90 recipes to administer, customize, and extend Jira Core and Jira Service Desk, 3rd Edition

Build customized solutions that fulfil your business requirements using the latest features of Jira 8

Key Features

  • Learn how to customize Jira applications to suit your organizational requirements
  • Extend Jira's capabilities for custom integrations with other products...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
unlimited object storage image
Result Page: 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy