Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Creating Blogs with Jekyll
Creating Blogs with Jekyll

Learn to create your own blog using the Jekyll static site generator. You’ll start with a simple template, add new features to it, automate any maintenance, attach social sharing, and begin writing. By the end of Creating Blogs with Jekyll, you will be able to create custom blogs with Jekyll, update the content with ease, and...

Acquired Long QT Syndrome
Acquired Long QT Syndrome

In recent years there has been considerable interest in the diagnosis and understanding of ventricular repolarisation, particularly the QT interval prolongation and abnormal T and T/U wave morphology associated with torsades de pointes. Advances in ion channel cloning have greatly improved our understanding of the role of ionic channels in...

R for Business Analytics
R for Business Analytics

R for Business Analytics looks at some of the most common tasks performed by business analysts and helps the user navigate the wealth of information in R and its 4000 packages.  With this information the reader can select the packages that can help process the analytical tasks with minimum effort and maximum usefulness. The use of...

Administering ArcGIS for Server
Administering ArcGIS for Server

Installing and configuring ArcGIS for Server to publish, optimize, and secure GIS services

About This Book

  • Configure ArcGIS for Server to achieve maximum performance and response time
  • Understand the product mechanics to build up good troubleshooting skills
  • Filled with...
Mastering IBM i: The Complete Resource for Today's IBM i System
Mastering IBM i: The Complete Resource for Today's IBM i System

The IBM i operating system running on IBM Power Systems is a platform in transition. Many think the system is obsolete, largely due to its infamous green screen. Nothing, though, could be further from the truth. When IBM embraced open-source software such as Linux, MySQL, and Zend PHP, the system cemented a formidable position in...

Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Beginning ASP.NET 2.0 with C# (Wrox Beginning Guides)
Beginning ASP.NET 2.0 with C# (Wrox Beginning Guides)
This book will teach you how to program web applications in ASP.NET 2.0 that can display data stored
in a database, provide a personalized user experience to your users, and even offer shopping functionality.
All of these sorts of web applications can be developed using ASP.NET 2.0, so if these are the sorts of
applications that you
...
Computational Photography: Methods and Applications (Digital Imaging and Computer Vision)
Computational Photography: Methods and Applications (Digital Imaging and Computer Vision)
Computational photography is a new and rapidly developing research field. It has evolved from computer vision, image processing, computer graphics, and applied optics, and refers broadly to computational imaging techniques that enhance or extend the capabilities of digital photography. The output of these techniques is an image...
Oracle ADF 11gR2 Development Beginner's Guide
Oracle ADF 11gR2 Development Beginner's Guide

Oracle ADF is an end-to-end framework which makes application development simple by providing infrastructure services as well as visual and declarative development right away.

"Oracle ADF 11gR2 Development Beginner's Guide" guides any user with programming skills to be able to quickly learn the options and ways to...

Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

CryENGINE 3 Game Development: Beginner's Guide
CryENGINE 3 Game Development: Beginner's Guide

Discover how to use the CryENGINE 3 free SDK, the next-generation, real-time game development tool

  • Begin developing your own games of any scale by learning to harness the power of the Award Winning CryENGINE® 3 game engine
  • Build your game worlds in real-time with CryENGINE® 3 Sandbox as we share...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy