Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics

Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.

This book builds upon the skills you learned in Volume 1...

Networking Fundamentals
Networking Fundamentals

A clear and concise resource on Windows networking, perfect for IT beginners

Did you know that nearly 85% of IT support roles require a good understanding of networking concepts? If you are looking to advance your IT career, you will need a foundational understanding of Windows networking. Network...

Programming Persistent Memory: A Comprehensive Guide for Developers
Programming Persistent Memory: A Comprehensive Guide for Developers

Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times?a huge leap forward in byte-addressable...

Automatic Control with Experiments (Advanced Textbooks in Control and Signal Processing)
Automatic Control with Experiments (Advanced Textbooks in Control and Signal Processing)

This textbook presents theory and practice in the context of automatic control education. It presents the relevant theory in the first eight chapters,

applying them later on to the control of several real plants. Each plant is studied following a uniform procedure: a) the plant’s function

is...

Factories of the Future: The Italian Flagship Initiative
Factories of the Future: The Italian Flagship Initiative
This book is open access under a CC BY 4.0 license.
This book presents results relevant in the manufacturing research field, that are mainly aimed at closing the gap between the academic investigation and the industrial application, in collaboration with manufacturing companies. Several hardware and software prototypes represent...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Quantum computers will revolutionize the way telecommunications networks function.

Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment....

Parallel Programming: for Multicore and Cluster Systems
Parallel Programming: for Multicore and Cluster Systems

Innovations in hardware architecture, like hyper-threading or multicore processors, mean that parallel computing resources are available for inexpensive desktop computers. In only a few years, many standard software products will be based on concepts of parallel programming implemented on such hardware, and the range of applications will be...

Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python
Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python

Develop real-world applications powered by the latest advances in intelligent systems

Key Features

  • Gain real-world contextualization using deep learning problems concerning research and application
  • Get to know the best practices to improve and optimize your machine...
Deep Learning with PyTorch: A practical approach to building neural network models using PyTorch
Deep Learning with PyTorch: A practical approach to building neural network models using PyTorch

Build neural network models in text, vision and advanced analytics using PyTorch

Key Features

  • Learn PyTorch for implementing cutting-edge deep learning algorithms.
  • Train your neural networks for higher speed and flexibility and learn how to implement them in various...
Writing Effective Use Cases
Writing Effective Use Cases
Writing use cases as a means of capturing the behavioral requirements of software systems and business processes is a practice that is quickly gaining popularity. Use cases provide a beneficial means of project planning because they clearly show how people will ultimately use the system being designed. On the surface, use cases appear to be a...
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Result Page: 170 169 168 167 166 165 164 163 162 161 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy