Home | Amazing | Today | Tags | Publishers | Years | Search 
Deploying LINUX on the Desktop
Deploying LINUX on the Desktop
Covering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!

Looking at the world of the
...
Open Source Web Site Construction Kit
Open Source Web Site Construction Kit
Gives readers a comprehensive survey of the best tools for building and maintaining Web sites. Author takes the reader through the process of thinking through and then building an open source Web site. Softcover.

This book gives readers a comprehensive survey of the best tools for building and maintaining Web sites. In a
...
Ubuntu: The Complete Reference (Complete Reference Series)
Ubuntu: The Complete Reference (Complete Reference Series)

The Definitive Guide to Ubuntu--Covers Ubuntu 8.04 LTS

Maximize the powerful features of Ubuntu with expert guidance, tips, and techniques from bestselling Linux author Richard Petersen. Packed with clear explanations and detailed examples, this comprehensive volume shows you how to get off the ground with Ubuntu, set up...

Red Hat Fedora Linux 3 For Dummies
Red Hat Fedora Linux 3 For Dummies
Get online with broadband DSL and build Web pages

Install Fedora Core 3, use OpenOffice.org, play CDs, and set up a firewall

The penguin is back, and better than ever! And this friendly guide will help you install and configure the new edition of Fedora Core so you can use exciting features like the SELinux infrastructure, which...

JRuby Cookbook
JRuby Cookbook
If you're interested in JRuby, you probably don't need a turorial on Ruby, Rails, or Java -- you just need to know how to get things done. This Cookbook offers practical solutions for using the Java implementation of the Ruby language, with targeted recipes for deploying Rails web applications on Java servers, integrating JRuby code with Java...
Web Server Administration (Web Warrior Series)
Web Server Administration (Web Warrior Series)

Web Server Administration offers a comprehensive overview of the tools and techniques needed to succeed as a Web Server Administrator as well as the tasks they are expected to perform. This text provides and introduction to the basics of this job role, covers server installation, and then moves on to the installation, configuration, and...

Getting Started with OpenShift
Getting Started with OpenShift

Intrigued by the possibilities of developing web applications in the cloud? With this concise book, you get a quick hands-on introduction to OpenShift, the open source Platform as a Service (PaaS) offering from Red Hat. You’ll learn the steps necessary to build, deploy, and host a complete real-world application on OpenShift,...

Emotionales Interaktionsdesign: Gesten und Mimik interaktiver Systeme (X.media.press) (German Edition)
Emotionales Interaktionsdesign: Gesten und Mimik interaktiver Systeme (X.media.press) (German Edition)

Multitouch-Interfaces und instrumentengestützte Eingabetechniken bestimmen inzwischen den Umgang mit digitalen Geräten. Interaktion zwischen Mensch und Technik wird in dem Buch als ein Wechselspiel von Gesten und Mimik betrachtet – auch seitens des Systems. Der Autor hat Sequenz- und Interaktionsdiagramme entwickelt, anhand...

Mobilität und Identität: Widerspruch in der modernen Gesellschaft (German Edition)
Mobilität und Identität: Widerspruch in der modernen Gesellschaft (German Edition)

​​Ein deutlicher gesellschaftlicher Wandel vollzieht sich in den letzten Jahren in der zunehmenden Mobilität der Menschen. Hat man sich von der Vorstellung eines Wohn- und Arbeitsortes in unmittelbarer Nähe bereits seit längerem verabschiedet, so werden die Distanzen immer größer. Tägliche Pendelzeiten...

Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Neuromuscular Disease: Evidence and Analysis in Clinical Neurology
Neuromuscular Disease: Evidence and Analysis in Clinical Neurology

A Certain Kind of Wisdom In Plato’s Apology, the Greek philosopher Socrates is on trial to defend himself against the allegation of corrupting the youth of Athens. Socrates denies this charge and offers an alternate reason for why he is on trial. He explains, “[w]hat has caused my reputation is none other than a certain kind of...

Java 8 in Action: Lambdas, Streams, and functional-style programming
Java 8 in Action: Lambdas, Streams, and functional-style programming

Summary

Java 8 in Action is a clearly written guide to the new features of Java 8. The book covers lambdas, streams, and functional-style programming. With Java 8's functional features you can now write more concise code in less time, and also automatically benefit from multicore architectures. It's...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy