Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning Fedora Desktop: Fedora 28 Edition
Beginning Fedora Desktop: Fedora 28 Edition

Get the most out of Fedora 28 Desktop, including free Office suites, editors, e-book readers, music and video applications. In addition to those features, you’ll also work with codecs, email clients, web browsers, FTP and BitTorrent clients, VoIP clients, and IM applications. The major Fedora 28 desktop spins are covered in...

The Tech Professional's Guide to Communicating in a Global Workplace: Adapting Across Cultural and Gender Boundaries
The Tech Professional's Guide to Communicating in a Global Workplace: Adapting Across Cultural and Gender Boundaries
Information technologists are increasingly being made part of global teams, and are confronting the challenges of communicating across a variety of linguistic and cultural boundaries. This book helps you know what to say, what not to say, and even where to sit in meetings and in social situations.

The Tech...
Ruby on Rails Tutorial (6th Edition) (Addison-Wesley Professional Ruby Series)
Ruby on Rails Tutorial (6th Edition) (Addison-Wesley Professional Ruby Series)
Used by sites as varied as Twitter, GitHub, Disney, and Airbnb, Ruby on Rails is one of the most popular frameworks for developing web applications, but it can be challenging to learn and use. Whether you’re new to web development or new only to Rails, Ruby on Rails™ Tutorial, Sixth Edition , is the...
Practical R 4: Applying R to Data Manipulation, Processing and Integration
Practical R 4: Applying R to Data Manipulation, Processing and Integration

Get started with an accelerated introduction to the R ecosystem, programming language, and tools including R script and RStudio. Utilizing many examples and projects, this book teaches you how to get data into R and how to work with that data using R. Once grounded in the fundamentals, the rest of Practical R...

Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals

The need for every professional to have a solid presence on the Internet is more important than ever before. Having a presence beyond an email account, such as a custom web page or web application, usually requires a clumsy assortment of outside services or hiring a dedicated administrator. Thus it is more sensible for the...

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from...
Linear Algebra and Geometry (AMS/MAA Textbooks)
Linear Algebra and Geometry (AMS/MAA Textbooks)
Linear Algebra and Geometry is organized around carefully sequenced problems that help students build both the tools and the habits that provide a solid basis for further study in mathematics. Requiring only high school algebra, it uses elementary geometry to build the beautiful edifice of results and methods that make linear algebra such an...
Beginning SharePoint Communication Sites: Creating and Managing Professional Collaborative Experiences
Beginning SharePoint Communication Sites: Creating and Managing Professional Collaborative Experiences
Understand SharePoint communication sites and create one on your own using SharePoint Home available in Office 365. This beginner's book will advise you about the ways to integrate your existing collaboration channels with SharePoint communication sites. Along the way you will see how to embed documents, videos, and real-time data...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your focus to...
The Electronics Revolution: Inventing the Future (Springer Praxis Books)
The Electronics Revolution: Inventing the Future (Springer Praxis Books)

This book is about how electronics, computing, and telecommunications have profoundly changed our lives – the way we work, live, and play. It covers a myriad of topics from the invention of the fundamental devices, and integrated circuits, through radio and television, to computers, mobile telephones...

The Influence of Technology on Social Network Analysis and Mining (Lecture Notes in Social Networks)
The Influence of Technology on Social Network Analysis and Mining (Lecture Notes in Social Networks)

The study of social networks was originated in social and business communities. In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social Web sites, email logs, phone logs and instant...

Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy