Home | Amazing | Today | Tags | Publishers | Years | Search 
Macintosh Terminal Pocket Guide
Macintosh Terminal Pocket Guide

Unlock the secrets of the Terminal and discover how this powerful tool solves problems the Finder can’t handle. With this handy guide, you’ll learn commands for a variety of tasks, such as killing programs that refuse to quit, renaming a large batch of files in seconds, or running jobs in the background while you do other...

Business Calculus Demystified
Business Calculus Demystified

Take the FEAR OUT of Business Calculus

Business Calculus Demystified clarifies the concepts and processes of calculus and demonstrates their applications to the workplace. Best-selling math author Rhonda Huettenmueller uses the same combination of winning step-by-step teaching techniques and real-world business and...

Production-Ready Microservices: Building Standardized Systems Across an Engineering Organization
Production-Ready Microservices: Building Standardized Systems Across an Engineering Organization
                 
One of the biggest challenges for organizations that have adopted microservice architecture is the lack of architectural, operational, and organizational standardization. After splitting a monolithic application or building a microservice ecosystem from scratch, many...
DevOps with Kubernetes: Accelerating software delivery with container orchestrators
DevOps with Kubernetes: Accelerating software delivery with container orchestrators

Learn to implement DevOps using Docker & Kubernetes.

About This Book

  • Learning DevOps, container, and Kubernetes within one book.
  • Leverage Kubernetes as a platform to deploy, scale, and run containers efficiently.
  • A practical guide towards container management and...
Understanding Swift Programming
Understanding Swift Programming

Covers Swift 2
Swift, Apple's new language for app development, has been widely praised for its clean, safe, and feature-rich design. The language is poised to quickly replace Objective-C for developing iOS apps.

Swift is now the 14th most popular language (Objective-C is #18, having sunk like a stone from #3) as...

UNIX System Programming for System VR4 (Nutshell Handbooks)
UNIX System Programming for System VR4 (Nutshell Handbooks)

Any program worth its salt uses operating system services. Even a simple program, if practical, reads input and produces output. And, most applications have more complex needs. They need to find out the time, use the network, or start and communicate with other processes. Systems programming really means nothing more than writing...

CentOS 6 Linux Server Cookbook
CentOS 6 Linux Server Cookbook

An all-in-one guide to installing, configuring, and running a Centos 6 server. Ideal for newbies and old-hands alike, this practical tutorial ensures you get the best from this popular, enterprise-class free server solution.

  • Delivering comprehensive insight into CentOS server with a series of starting points that show you...
Unsupervised Learning with R
Unsupervised Learning with R

Work with over 40 packages to draw inferences from complex datasets and find hidden patterns in raw unstructured data

About This Book

  • Unlock and discover how to tackle clusters of raw data through practical examples in R
  • Explore your data and create your own models from scratch
  • ...
Citrix Access Gateway VPX 5.04 Essentials
Citrix Access Gateway VPX 5.04 Essentials

A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX

Overview

  • A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
  • Establish secure access...
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.

You'll learn how to configure your network from the ground up, starting by setting up your...

Independent Component Analysis of Edge Information for Face Recognition (SpringerBriefs in Applied Sciences and Technology)
Independent Component Analysis of Edge Information for Face Recognition (SpringerBriefs in Applied Sciences and Technology)

The book presents research work on face recognition using edge information as features for face recognition with ICA algorithms. The independent components are extracted from edge information. These independent components are used with classifiers to match the facial images for recognition purpose. In their study, authors have explored Canny...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy