Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Jenkins Blue Ocean: Create Elegant Pipelines With Ease
Beginning Jenkins Blue Ocean: Create Elegant Pipelines With Ease
Dive deep into Jenkins Blue Ocean and discover how easy creating a pipeline can be. You’ll see how Blue Ocean provides a better user experience when designing, running, and visualizing pipelines. This book shows you its intuitive user interface and its powerful pipeline editor and how this makes it a tool for everyone....
Security+ Study Guide
Security+ Study Guide
Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study Guides

The Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test
...
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Beginning Fedora 2
Beginning Fedora 2

Beginning Fedora 2 teaches you everything you need to know in order to install, configure, use, and maintain Fedora. This book targeted primarily at readers who are using (or planning to use) the Fedora Linux operating system for the first time. It offers the simple, plain-speaking guidance you need as you begin to explore the vast...

Securing and Controlling Cisco Routers
Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting...

Pro SharePoint Disaster Recovery and High Availability
Pro SharePoint Disaster Recovery and High Availability

Few IT professionals take the time to learn what needs to be known to do disaster recovery well. Most labor under the pretense that good administration equals close to five-nines uptime. Most technical people do not see the value of planning for disasters until the unexpected has already happened, and the effects of a disaster involving a...

Systems Programmer's Guide to Z/OS System Logger
Systems Programmer's Guide to Z/OS System Logger

This Redbook provides system programmers with a solid understanding of the System Logger component and guidance about how it should be set up for optimum performance with each of the exploiters.


The z/OS System Logger is a function provided by the operating system to exploiters running on z/OS. The number of exploiters of...

Web Search Engine Research (Library and Information Science)
Web Search Engine Research (Library and Information Science)

Web Search Engine Research, edited by Dirk Lewandowski, provides an understanding of Web search engines from the unique perspective of Library and Information Science. The book explores a range of topics including retrieval effectiveness, user satisfaction, the evaluation of search interfaces, the impact of search on society, reliability of...

Game Hacking: Developing Autonomous Bots for Online Games
Game Hacking: Developing Autonomous Bots for Online Games

You don't need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle.

Bring your knowledge of Windows-based development and memory management, and Game...

Deductive Databases and Their Applications
Deductive Databases and Their Applications
Deductive Databases and their Applications is an introductory text aimed at undergraduate students with some knowledge of database and information systems. The text comes complete with exercises and solutions to encourage students to tackle problems practically as well as theoretically. The author presents the origins of deductive databases in...
Absorption and Drug Development: Solubility, Permeability, and Charge State
Absorption and Drug Development: Solubility, Permeability, and Charge State
Profiling compounds for drug-like properties

Of the hundreds of thousands of compounds synthesized each year, most have almost no chance of becoming drugs. This problem exists because most molecules lack eht drug-like poperties necessary to enable them to be effective in vivo. To address this issue, Alex Avdeef’s Absorption and...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy