Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
LPIC 1 Certification Bible
LPIC 1 Certification Bible
Every other teenager and tens of thousands of university students have installed Linux and configured it for this job or that. That doesn't mean they're qualified to run Linux servers for a company that relies on them, regardless of what they may claim on their résumés. Your claim to real professional Linux competence will be...
Topological Methods in Data Analysis and Visualization: Theory, Algorithms, and Applications (Mathematics and Visualization)
Topological Methods in Data Analysis and Visualization: Theory, Algorithms, and Applications (Mathematics and Visualization)

The deluge of data observed throughout research and industry has turned the analysis of the resulting information into the primary limiting factor for the rapid progress of science, engineering, and medicine. The field of visualization strives to tackle this data analysis challenge by devising visual representations that afford users an...

CCNP: Routing Study Guide (Exam 640-503)
CCNP: Routing Study Guide (Exam 640-503)
This book is intended to help you continue on your exciting new path toward obtaining your CCNP and CCIE certification. Before reading this book, it is important to have at least read the Sybex CCNA: Cisco Certified Network Associate Study Guide, Second Edition. You can take the CCNP tests in any order, but...
PICAXE Microcontroller Projects for the Evil Genius
PICAXE Microcontroller Projects for the Evil Genius

WHIP UP SOME FIENDISHLY FUN PICAXE MICROCONTROLLER DEVICES

"Ron has worked hard to explain how the PICAXE system operates through simple examples, and I'm sure his easy-to-read style will help many people progress with their PICAXE projects."

This wickedly inventive guide shows you how to program,...

IT Service Management Guide: Vol. 1
IT Service Management Guide: Vol. 1
The importance of IT Service Management is becoming widely recognized. Whereas in the 1960s and 1970s interest was still focused mainly on the improvement of hardware, and whereas the development of software was the major concern until well into the 1980s, the 1990s was the decade that saw the rise of service management.

For decades,
...
Moving From Windows To Linux (Networking Series)
Moving From Windows To Linux (Networking Series)

Most computer users utilize the Windows operating system. Today, however, many experienced computer users are either moving to Linux or would like the option. One factor holding many people back is the fear of learning a new operating system and applications.
This book uses a friendly, step-by-step style to walk the user through the
...

Requirements Engineering: Foundation for Software Quality: 18th International Working Conference
Requirements Engineering: Foundation for Software Quality: 18th International Working Conference

This LNCS volume contains the papers accepted for presentation at the 18th Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2012), held in Essen, Germany, during March 19–22, 2012.

Requirements engineering (RE) has long been recognized as a major factor for achieving high-quality...

Advanced R Statistical Programming and Data Models: Analysis, Machine Learning, and Visualization
Advanced R Statistical Programming and Data Models: Analysis, Machine Learning, and Visualization
Carry out a variety of advanced statistical analyses including generalized additive models, mixed effects models, multiple imputation, machine learning, and missing data techniques using R. Each chapter starts with conceptual background information about the techniques, includes multiple examples using R to achieve results, and...
UNIX Network Programming, Volume 2: Interprocess Communications (2nd Edition)
UNIX Network Programming, Volume 2: Interprocess Communications (2nd Edition)
This book describes four different forms of IPC in detail:
  1. message passing (pipes, FIFOs, and message queues),
  2. synchronization (mutexes, condition variables, read-write locks, file and record locks, and semaphores),
  3. shared memory (anonymous and named), and
  4. remote...
Return on Software : Maximizing the Return on Your Software Investment
Return on Software : Maximizing the Return on Your Software Investment

Is your organization maximizing the return on its investments of money, time, and personnel? Probably not, because most software professionals don't know how to consider the business aspects of their software decisions. Most don't even know that it's important to do so. Business consequences should play a critical role in all...

Interest Rate Modelling (Finance and Capital Markets)
Interest Rate Modelling (Finance and Capital Markets)
Growth in the derivatives markets has brought with it an ever-increasing volume and range of interest rate dependent derivative products. To allow profitable, efficient trading in these products, accurate and mathematically sound valuation techniques are required to make pricing, hedging and risk management of the resulting positions possible. ...
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy