Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Networking (2nd Edition) (Networking Technology)
Networking (2nd Edition) (Networking Technology)

This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical...

Raspberry Pi Gaming Second Edition
Raspberry Pi Gaming Second Edition

Design, create, and play all kinds of video games on your Raspberry Pi computer

About This Book

  • Program your very own video game on the Raspberry Pi using the Scratch programming language
  • Install and manage your Raspberry Pi
  • Set up your Raspberry Pi to play hundreds of...
Intel Galileo Essentials
Intel Galileo Essentials

Leverage the power of Intel Galileo to construct amazingly simple, yet impressive projects

About This Book

  • Learn how to connect additional hardware to the Intel Galileo to easily create complex robots
  • Understand GPIO pins on the Galileo and how to use them
  • Control a DC...
Learn Linux in a Month of Lunches
Learn Linux in a Month of Lunches

Summary

Learn Linux in a Month of Lunches shows you how to install and use Linux for all the things you do with your OS, like connecting to a network, installing software, and securing your system. Whether you're just curious about Linux or have to get up and running for your job, you'll appreciate...

Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Linux in a Nutshell (In a Nutshell (O'Reilly))
Linux in a Nutshell (In a Nutshell (O'Reilly))

Linux in a Nutshell covers the core commands available on common Linux distributions. This isn't a scaled-down quick reference of common commands, but a complete reference containing all user, programming, administration, and networking commands.Contents include:

  • Commands with complete lists of...
Beginning MySQL (Programmer to Programmer)
Beginning MySQL (Programmer to Programmer)
As the most popular open source database system in the world, MySQL boasts ease of implementation, minimal overhead, consistent reliability, and low total cost of ownership. This hands-on resource offers you a complete look at MySQL and explains how to implement MySQL and access MySQL with various programming languages.

Using a task-oriented...

Mastering System Center Operations Manager 2007
Mastering System Center Operations Manager 2007
Harness Microsoft's Powerful Server Management Tool

If you're an IT professional, you're busy enough trying to manage multiple systems and stay proactive with the technology demands of today's fast-moving companies. System Center Operations Manager 2007 is designed to make your life easier—and this comprehensive book...

Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV puts you right in the middle of the rapidly expanding field of computer vision. Written by the creators of OpenCV, the widely used free open-source library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on the...
Digital Forensics with Open Source Tools
Digital Forensics with Open Source Tools

Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. Both well known and novel forensic...

Getting Started with DraftSight
Getting Started with DraftSight

Computer-aided design (CAD) uses computer systems to assist in the creation, modification, and analysis of a design. DraftSight is a 2D computer-aided design (CAD) software application. DraftSight includes all the main tools to draft with precision, and it works with DWG files, the most popular CAD file type. It runs on a wide variety of...

unlimited object storage image
Result Page: 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy