Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Functional Programming: A PragPub Anthology: Exploring Clojure, Elixir, Haskell, Scala, and Swift
Functional Programming: A PragPub Anthology: Exploring Clojure, Elixir, Haskell, Scala, and Swift

Explore functional programming and discover new ways of thinking about code. You know you need to master functional programming, but learning one functional language is only the start. In this book, through articles drawn from PragPub magazine and articles written specifically for this book, you'll explore functional...

Understanding PaaS
Understanding PaaS

The least understood feature of cloud computing, Platform as a Service (PaaS), is also the most powerful and cost effective. This concise overview shows you why organizations that properly wield PaaS can quickly gain a strong competitive advantage. You’ll learn how PaaS enables developers to pursue low cost R&D projects,...

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Hybrid Cloud Management with Red Hat CloudForms
Hybrid Cloud Management with Red Hat CloudForms

Build, manage, and control an open hybrid cloud infrastructure using Red Hat CloudForms

About This Book

  • Understand the infrastructure management capabilities through monitoring and tracking techniques
  • Control the hybrid cloud infrastructure using policies and define actions based on...
Java 8 in Action: Lambdas, Streams, and functional-style programming
Java 8 in Action: Lambdas, Streams, and functional-style programming

Summary

Java 8 in Action is a clearly written guide to the new features of Java 8. The book covers lambdas, streams, and functional-style programming. With Java 8's functional features you can now write more concise code in less time, and also automatically benefit from multicore architectures. It's...

SELinux by Example: Using Security Enhanced Linux
SELinux by Example: Using Security Enhanced Linux

SELinux: Bring World-Class Security to Any Linux Environment!

 

SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure...

Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators
Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators

The definitive guide to administering a Red Hat Enterprise Linux 6 network

Linux professionals who need a go-to guide on version 6 of Red Hat Enterprise Linux (RHEL) will find what they need in this comprehensive Sybex book. It covers RHEL administration in detail, including how to set up and manage web and mail services,...

Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Ubuntu: The Complete Reference (Complete Reference Series)
Ubuntu: The Complete Reference (Complete Reference Series)

The Definitive Guide to Ubuntu--Covers Ubuntu 8.04 LTS

Maximize the powerful features of Ubuntu with expert guidance, tips, and techniques from bestselling Linux author Richard Petersen. Packed with clear explanations and detailed examples, this comprehensive volume shows you how to get off the ground with Ubuntu, set up...

Programming Microsoft SQL Server 2000 with Microsoft Visual Basic .NET
Programming Microsoft SQL Server 2000 with Microsoft Visual Basic .NET
Learn how to turn data into solutions with SQL Server 2000, Visual Basic .NET, and XML. Get a fundamental grasp of SQL Server 2000 data access, data manipulation, and data definition T-SQL programming techniques, Visual Basic .NET language enhancements, Microsoft Visual Studio .NET integrated development environment advances, and the...
Result Page: 21 20 19 18 17 16 15 14 13 12 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy