Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet Psychology (The Basics)
Internet Psychology (The Basics)

We can't imagine our lives without the Internet. It is the tool of our existence; without it we couldn't work, plan our social and leisure activities, and interact with friends. The Internet’s influence on contemporary society extends across every aspect of our personal and professional lives, but how has this altered us in...

Programming Interviews Exposed: Secrets to Landing Your Next Job
Programming Interviews Exposed: Secrets to Landing Your Next Job
The most important thing we have to tell you is the same as in the first edition: You will get as much out of this book as you put into it. If you read this book cover to cover, you will learn something, but not nearly as much as you would if you take some time trying to work through the problems before you read the answers. ...
Mastering Kubernetes: Large scale container deployment and management
Mastering Kubernetes: Large scale container deployment and management

Master the art of container management utilizing the power of Kubernetes.

About This Book

  • This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
  • Discover new features such as autoscaling, rolling updates, resource quotas,...
Investing Without Borders: How Six Billion Investors Can Find Profits in the Global Economy
Investing Without Borders: How Six Billion Investors Can Find Profits in the Global Economy

An insightful examination of the skills needed to be a proactive investor and find diverse investment opportunities in the emerging economy

There is no little league on Wall Street and no white belts. Here or abroad, you are put in immediately with the black belts – the best and the brightest. Think like an amateur and they...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Complexity and Cryptography : An Introduction
Complexity and Cryptography : An Introduction
This book originated in a well-established yet constantly evolving course on
Complexity and Cryptography which we have both given to final year Mathematics
undergraduates at Oxford for many years. It has also formed part of an
M.Sc. course on Mathematics and the Foundations of Computer Science, and
has been the basis for a more
...
Operating Systems
Operating Systems

The main objective of a first course in operating systems is to develop an understanding of the fundamental concepts and techniques of operating systems. Most of the students are already exposed to diverse information on operating systems as a result of practical exposure to operating systems and literature on the Internet; such...

Troubleshooting SQL Server - A Guide for the Accidental DBA
Troubleshooting SQL Server - A Guide for the Accidental DBA
I've spent much of the last six years of my working life trying to help people solve SQL Server-related performance problems, either hands-on, at client sites in my capacity as a consultant, or on various online community forums, answering people's questions.

Over that time I've been exposed to a few weird
...
DevOps for Web Development
DevOps for Web Development

About This Book

  • Overcome the challenges of implementing DevOps for web applications, familiarize yourself with diverse third-party modules, and learn how to integrate them with bespoke code to efficiently complete tasks
  • Understand how to deploy web applications for a variety of Cloud platforms such as...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Getting an Information Security Job For Dummies
Getting an Information Security Job For Dummies

Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an...

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Result Page: 21 20 19 18 17 16 15 14 13 12 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy