Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

Linux Pocket Guide
Linux Pocket Guide

O'Reilly's Pocket Guides have earned a reputation as inexpensive, comprehensive, and compact guides that have the stuff but not the fluff. Every page of Linux Pocket Guide lives up to this billing. It clearly explains how to get up to speed quickly on day-to-day Linux use. Once you're up and running, Linux Pocket...

Rapid BeagleBoard Prototyping with MATLAB and Simulink
Rapid BeagleBoard Prototyping with MATLAB and Simulink

Leverage the power of BeagleBoard to develop and deploy practical embedded projects

Overview

  • Develop and validate your own embedded audio/video applications rapidly with Beagleboard
  • Create embedded Linux applications on a pure Windows PC
  • Full of illustrations, diagrams, and...
Prime Numbers: The Most Mysterious Figures in Math
Prime Numbers: The Most Mysterious Figures in Math

A fascinating journey into the mind-bending world of prime numbers

Cicadas of the genus Magicicada appear once every 7, 13, or 17 years. Is it just a coincidence that these are all prime numbers? How do twin primes differ from cousin primes, and what on earth (or in the mind of a mathematician) could be sexy about prime numbers?
...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Learn Blockchain Programming with JavaScript: Build your very own Blockchain and decentralized network with JavaScript and Node.js
Learn Blockchain Programming with JavaScript: Build your very own Blockchain and decentralized network with JavaScript and Node.js

Explore the essentials of blockchain technology with JavaScript to develop highly secure bitcoin-like applications

Key Features

  • Develop bitcoin and blockchain-based cryptocurrencies using JavaScript
  • Create secure and high-performant blockchain networks
  • ...
Building Dashboards with Microsoft Dynamics GP 2013 and Excel 2013
Building Dashboards with Microsoft Dynamics GP 2013 and Excel 2013

Microsoft Dynamics GP and Excel are made for each other. With this book you'll learn to use Excel to present the information contained in Dynamics in a data-rich dashboard. Step-by-step instructions come with real-life examples.

Overview

  • Build a dashboard using Excel 2013 with information from...
Machine Learning and Data Mining for Computer Security: Methods and Applications
Machine Learning and Data Mining for Computer Security: Methods and Applications

"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security.

The first part of the...

Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
Practical PHP 7, MySQL 8, and MariaDB Website Databases: A Simplified Approach to Developing Database-Driven Websites
Practical PHP 7, MySQL 8, and MariaDB Website Databases: A Simplified Approach to Developing Database-Driven Websites
Build interactive, database-driven websites with PHP 7, MySQL 8, and MariaDB. The focus of this book is on getting you up and running as quickly as possible with real-world applications. In the first two chapters, you will set up your development and testing environment, and then build your first PHP and MariaDB or...
Pro Continuous Delivery: With Jenkins 2.0
Pro Continuous Delivery: With Jenkins 2.0
Follow this step-by-step guide for creating a continuous delivery pipeline using all of the new features in Jenkins 2.0 such as Pipeline as a Code, multi-branch pipeline, and more. You will learn three crucial elements for achieving a faster software delivery pipeline: a fungible build/test environment, manageable and reproducible...
MySQL 8 Administrator's Guide: Effective guide to administering high-performance MySQL 8 solutions
MySQL 8 Administrator's Guide: Effective guide to administering high-performance MySQL 8 solutions

Step by step guide to monitor, manage, and secure your database engine

Key Features

  • Your companion to master all the administration-related tasks in MySQL 8
  • Ensure high performance and high availability of your MySQL solution using effective replication and backup...
Result Page: 62 61 60 59 58 57 56 55 54 53 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy