Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Survey of Operating Systems
Survey of Operating Systems

Holcombe, "Survey of Operating Systems, 3e" is 'your foundation for IT Success!' McGraw-Hill is proud to introduce the third edition of Jane and Charles Holcombe's, "Survey of Operating Systems". This edition is a unique revision of the successful previous editions. Every chapter has been updated to include...

Linux Kernel Networking: Implementation and Theory (Expert's Voice in Open Source)
Linux Kernel Networking: Implementation and Theory (Expert's Voice in Open Source)

Linux Kernel Networking takes you on a guided in-depth tour of the current Linux networking implementation and the theory behind it. Linux kernel networking is a complex topic, so the book won't burden you with topics not directly related to networking. This book will also not overload you with cumbersome line-by-line code...

Python Pocket Reference, 2nd Edition
Python Pocket Reference, 2nd Edition
This pocket reference covers the latest Python release 2.2. It is a short, concise reference for the Python programming language, and its most commonly used libraries and tools. Designed to be a quick and easy to use resource for developers, this book serves as a natural companion to O'Reilly's Learning Python and...
Open-Source Robotics and Process Control Cookbook : Designing and Building Robust, Dependable Real-time Systems
Open-Source Robotics and Process Control Cookbook : Designing and Building Robust, Dependable Real-time Systems
In this practical reference, popular author Lewin Edwards shows how to develop robust, dependable real-time systems for robotics and other control applications, using open-source tools. It demonstrates efficient and low-cost embedded hardware and software design techniques, based on Linux as the development platform and operating system and the...
Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

 

Drawing on his extensive experience consulting on large-scale ESX Server implementations,...

Ubuntu 8.10 Linux Bible
Ubuntu 8.10 Linux Bible
A Linux distribution is basically the sum of the things that you need to run Linux on your computer. There are many different Linux distributions, each with its own target audience, set of features, administrative tools, and fan club, the latter of which is more properly known as a user community. Putting aside the downright fanatics, most of the...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Linux in a Windows World
Linux in a Windows World
The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment. This book takes an in-depth look at exactly how Linux can be brought into an organization that's currently based...
Linux Programming by Example
Linux Programming by Example
Discusses how LINUX works at the system level by learning how and when to manipulate processes, send and catch signals, and use calls, and how to manipulate and read pipes and FIFOs. Softcover.

Linux Programming By Example introduces programmers with some background in C but no knowledge of the specifics of Linux programming
...
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Complete Web Monitoring: Watching your visitors, performance, communities, and competitors
Do you really understand your online presence? Are you confident that visitors can use your website? Do you know their motivations? How do online communities perceive your company? To innovate and adapt your business quickly, you must know the answers to these questions. Complete Web Monitoring demonstrates how to measure every aspect of your web...
Windows System Programming (4th Edition) (Addison-Wesley Microsoft Technology Series)
Windows System Programming (4th Edition) (Addison-Wesley Microsoft Technology Series)

“If you’re writing a native Win32 program or just want to know what the OS is really doing underneath, you need John’s book. He covers the stuff that real systems programmers absolutely must know. Recommended.”

–Chris Sells, Microsoft Corporation

...
unlimited object storage image
Result Page: 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy