Home | Amazing | Today | Tags | Publishers | Years | Search 
Toll-Like Receptors (TLRs) and Innate Immunity (Handbook of Experimental Pharmacology)
Toll-Like Receptors (TLRs) and Innate Immunity (Handbook of Experimental Pharmacology)
In the second half of the 20th century innate immune responses of cellular or humoral type were treated like stepchildren by many immunologists: that is, somewhat neglected. This disregard turned into an exciting research field over the past several years and led to the identification of receptor families involved in the recognition...
Pro Continuous Delivery: With Jenkins 2.0
Pro Continuous Delivery: With Jenkins 2.0
Follow this step-by-step guide for creating a continuous delivery pipeline using all of the new features in Jenkins 2.0 such as Pipeline as a Code, multi-branch pipeline, and more. You will learn three crucial elements for achieving a faster software delivery pipeline: a fungible build/test environment, manageable and reproducible...
Magento 2 Developer's Guide
Magento 2 Developer's Guide

Harness the power of Magento 2 – The most recent version of the world's favourite e-Commerce platform for your online store

About This Book

  • Set up, configure, and power up your Magento environment from development to production
  • Master the use of Web API to communicate with the...
Docker Cookbook: Solutions and Examples for Building Distributed Applications
Docker Cookbook: Solutions and Examples for Building Distributed Applications

Whether you’re deploying applications on premise or in the cloud, this cookbook provides developers, operators, and IT professionals with more than 130 proven recipes for working with Docker.

With these practical solutions, experienced developers with no previous knowledge of Docker will be able to package and...

Learning PHP 7
Learning PHP 7

Key Features

  • Set up the PHP environment and get started with web programming
  • Leverage the potential of PHP for server-side programming, memory management, and object-oriented programming (OOP)
  • This book is packed with real-life examples to help you implement the concepts as you learn
  • ...
Mastering Linux Shell Scripting
Mastering Linux Shell Scripting

Key Features

  • Identify the high level steps such as verifying user input, using command lines and conditional statements in creating and executing simple shell scripts
  • Create and edit dynamic shell scripts to manage complex and repetitive tasks
  • Learn about scripting in Perl and programming in...
Docker Bootcamp
Docker Bootcamp

Fast, intensive, and effective Docker learning

About This Book

  • Get well-versed with Docker in 7 days
  • Identify and resolve common problems faced by users while working with Docker
  • A fast-paced guide that will focus on all the core Docker functionalities

...

The Game Plan: Your Guide to Mental Toughness at Work
The Game Plan: Your Guide to Mental Toughness at Work

"Steve Bull is a true expert in his field. Anyone interested in winning will profit from his experience and knowledge."
—Andrew 'Freddie' Flintoff

"Steve Bull’s ideas and techniques will equip anyone in business with a game plan for acquiring the winning edge."
—From the
...

Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)
Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)

Southeast Asia has been the breeding ground for many emerging diseases in the past decade, e.g. the avian flu (H5N1) in Hong Kong in 1997, Nipah virus encephalitis in Malaysia in 1998, and, above all, the SARS outbreak in Southern China in 2002. Risk factors contributing to this situation include being economically disadvantaged, sub-standard...

Cardiac Gene Expression: Methods and Protocols (Methods in Molecular Biology)
Cardiac Gene Expression: Methods and Protocols (Methods in Molecular Biology)

This book presents both cutting-edge and established methods for studying cardiac gene expression. The protocols provide a template for solid research, and cover the process through screening, analysis, characterization, and functional confirmation of novel genes or known genes with a new function. The concluding section of the book...

Network Security Through Data Analysis: From Data to Action
Network Security Through Data Analysis: From Data to Action

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll...

Adenovirus Methods and Protocols, Vol. 2: Ad Proteins and RNA, Lifecycle and Host Interactions, and Phyologenetics (Methods in Molecular Medicine, Vol. 131)
Adenovirus Methods and Protocols, Vol. 2: Ad Proteins and RNA, Lifecycle and Host Interactions, and Phyologenetics (Methods in Molecular Medicine, Vol. 131)

Adenovirus Methods and Protocols, Second Edition, now in two volumes, is an essential resource for adenovirus (Ad) researchers beginning in the field, and an inspirational starting point for researchers looking to branch into new areas of Ad study. In addition to updating and expanding important chapters from the first edition, the authors...

Result Page: 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy