Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PowerShell Deep Dives
PowerShell Deep Dives

Summary

Here's your chance to learn from the best in the business. PowerShell Deep Dives is a trove of essential techniques, practical guidance, and the expert insights you earn only through years of experience. Editors Jeffery Hicks, Richard Siddaway, Oisin Grehan, and Aleksandar Nikolic hand-picked...

C Traps and Pitfalls
C Traps and Pitfalls
C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual behavior of a program to differ. The book's experienced author, Koenig, follows up with examples and helpful advice on many of these "pitfalls." Each chapter includes exercises for...
Python How to Program (With CD-ROM)
Python How to Program (With CD-ROM)

The authoritative DEITEL LIVE-CODE introduction to Python programming

This new book by the world's leading programming language textbook authors carefully explains how to use Python as a general-purpose programming language and how to program multi-tier, client/server,...

The The Massachusetts General Hospital Handbook of Neurology
The The Massachusetts General Hospital Handbook of Neurology
As with the first edition, this handbook's goals are to quickly remind and update the reader. It therefore strives to be well cross-referenced, terse, and thin a pocket book should really fit in the pocket. We have tried to keep in mind that the head is actually connected to the body, and include sections on medicine and other...
Third Generation Systems and Intelligent Wireless Networking: Smart Antennas and Adaptive Modulation
Third Generation Systems and Intelligent Wireless Networking: Smart Antennas and Adaptive Modulation
Third-Generation Systems and Intelligent Wireless Networking studies the network capacity gains that can be achieved with the advent of adaptive antenna arrays and adaptive modulation techniques in both FDMA / TDMA and CDMA based mobile cellular networks. The employment of adaptive antennas has numerous benefits and advantages. These...
Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011
Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011

The 13th IMA Conference on Cryptography and Coding was held at the Lady Margaret Hall, University of Oxford, UK, during December 12–15, 2011. This event was a 25th anniversary celebration of the very successful biennial IMA conference series. Traditionally, the conference has taken place at the Royal Agricultural College,...

Beautiful Visualization: Looking at Data through the Eyes of Experts
Beautiful Visualization: Looking at Data through the Eyes of Experts

Visualization is the graphic presentation of data -- portrayals meant to reveal complex information at a glance. Think of the familiar map of the New York City subway system, or a diagram of the human brain. Successful visualizations are beautiful not only for their aesthetic design, but also for elegant layers of detail that...

Religious Responses to Modernity
Religious Responses to Modernity

The dawn of the modern age posed challenges to all of the world's religions and since then, religions have countered with challenges to modernity. In Religious Responses to Modernity, seven leading scholars from Germany and Israel explore specific instances of the face-off between religious thought and modernity, in Christianity,...

Jakarta Pitfalls: Time-Saving Solutions for Struts, Ant, JUnit, and Cactus
Jakarta Pitfalls: Time-Saving Solutions for Struts, Ant, JUnit, and Cactus
Escape from common coding pitfalls with this detailed book of proven Jakarta missteps and solutions

The dangers of Jakarta pitfalls are everywhere and countless developers have already been trapped. These mistakes have delayed schedules, allowed major bugs to get into the users’ hands, or led to numerous rewrites in maintenance. Luckily,...

The Employer Bill of Rights: A Manager's Guide to Workplace Law
The Employer Bill of Rights: A Manager's Guide to Workplace Law

Any employee can sue any employer at any time, and for just about any reason. There is no such thing as a bulletproof personnel decision. It’s no wonder businesses fear lawsuits from employees—they are costly in terms of time, money, and distraction.  

But fear not. The Employer Bill of Rights: A...

Gray Hat Hacking, Second Edition
Gray Hat Hacking, Second Edition
Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...

Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy