Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

CompTIA Linux+ Guide to Linux Certification (MindTap Course List)
CompTIA Linux+ Guide to Linux Certification (MindTap Course List)

Equip yourself with the most up-to-date information to pass CompTIA's Linux+ (Powered by LPI) Certification exam successfully and excel when using Linux in today's business world with Eckert's LINUX+ GUIDE TO LINUX CERTIFICATION, 4E. This complete guide provides the solid conceptual foundation and mastery of hands-on skills...

Advanced Linux Networking
Advanced Linux Networking

With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful...

Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Hardening Linux
Hardening Linux

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as...

Medical Image Analysis
Medical Image Analysis

The expanded and revised edition will split Chapter 4 to include more details and examples in FMRI, DTI, and DWI for MR image modalities. The book will also expand ultrasound imaging to 3-D dynamic contrast ultrasound imaging in a separate chapter.

A new chapter on Optical Imaging Modalities elaborating microscopy, confocal...

Fuzzy Expert Systems and Fuzzy Reasoning
Fuzzy Expert Systems and Fuzzy Reasoning
The most advanced systems that can emulate human thought

Fuzzy Expert Systems and Fuzzy Reasoning presents new, cutting-edge theories that enable programmers to emulate human thought processes to solve real-life problems. This text begins with an overview and comparison of current approaches, including rule-based and neural net systems that...

Analysis of Biological Networks (Wiley Series in Bioinformatics)
Analysis of Biological Networks (Wiley Series in Bioinformatics)
An introduction to biological networks and methods for their analysis

Analysis of Biological Networks is the first book of its kind to provide readers with a comprehensive introduction to the structural analysis of biological networks at the interface of biology and computer science. The book begins with a brief overview of biological networks...

Exploring Expect: A Tcl-based Toolkit for Automating Interactive Programs
Exploring Expect: A Tcl-based Toolkit for Automating Interactive Programs

Written by the author of Expect, this is the first book to explain how this part of the UNIX toolbox can be used to automate Telnet, FTP, passwd, rlogin, and hundreds of other interactive applications. Based on Tcl (Tool Command Language), Expect lets you automate interactive applications that have previously been extremely difficult to handle...

Learn Windows IIS in a Month of Lunches
Learn Windows IIS in a Month of Lunches

Summary

Learn Windows IIS in a Month of Lunches is an innovative tutorial designed for busy administrators. Even if you have no prior exposure to IIS, you can follow the crisp explanations, examples, and exercises in this concise, easy-to-read book. Just set aside one hour a day—lunchtime would be...

Tcl 8.5 Network Programming
Tcl 8.5 Network Programming

Tcl (Tool Command Language) is a very powerful and easy to learn dynamic programming language, suitable for a very wide range of uses. Tcl is regarded as one of the best-kept secrets in the software industry. This book gives you a hands-on experience on Tcl, helping you develop network-aware applications using this mature yet evolving...

Result Page: 14 13 12 11 10 9 8 7 6 5 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy