Home | Amazing | Today | Tags | Publishers | Years | Search 
Linux Essentials
Linux Essentials

A unique, full-color introduction to Linux fundamentals

Serving as a low-cost, secure alternative to expensive operating systems, Linux is a UNIX-based, open source operating system. Full-color and concise, this beginner's guide takes a learning-by-doing approach to understanding the essentials of Linux. Each chapter...

Project Management Maturity Model: Providing a Proven Path to Project Management Excellence (PM Solutions Research)
Project Management Maturity Model: Providing a Proven Path to Project Management Excellence (PM Solutions Research)

Project Management Maturity Model: Providing a Proven Path to Project Management Excellence offers effective strategies for the implementation of efficient project management systems for increased levels of organizational maturity, time and cost conservation, quality assurance, and project success. It details areas critical to organizational...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

A Common-Sense Guide to Data Structures and Algorithms: Level Up Your Core Programming Skills
A Common-Sense Guide to Data Structures and Algorithms: Level Up Your Core Programming Skills

Algorithms and data structures are much more than abstract concepts. Mastering them enables you to write code that runs faster and more efficiently, which is particularly important for today’s web and mobile apps. This book takes a practical approach to data structures and algorithms, with techniques and real-world scenarios...

Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis

Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves...

The SEO Battlefield: Winning Strategies for Search Marketing Programs
The SEO Battlefield: Winning Strategies for Search Marketing Programs

Welcome to the battlefield. Every day, companies ranging from startups to enterprises fight to achieve high search rankings, knowing that previous success can quickly vanish. With this practical guide, you’ll learn how to put search engine optimization (SEO) methodology into practice, including the research, data analysis, and...

Arduino Playground: Geeky Projects for the Experienced Maker
Arduino Playground: Geeky Projects for the Experienced Maker

You’ve mastered the basics, conquered the soldering iron, and programmed a robot or two; now you’ve got a set of skills and tools to take your Arduino exploits further. But what do you do once you’ve exhausted your to-build list?

Arduino Playground will show you how to keep your hardware hands busy
...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications.

In DevOps for Digital Leaders, deep collective experience on both...
Hands-On Concurrency with Rust: Confidently build memory-safe, parallel, and efficient software in Rust
Hands-On Concurrency with Rust: Confidently build memory-safe, parallel, and efficient software in Rust

Get to grips with modern software demands by learning the effective uses of Rust's powerful memory safety.

Key Features

  • Learn and improve the sequential performance characteristics of your software
  • Understand the use of operating system processes in a high-scale...
Qt 5 and OpenCV 4 Computer Vision Projects: Get up to speed with cross-platform computer vision app development by building seven practical projects
Qt 5 and OpenCV 4 Computer Vision Projects: Get up to speed with cross-platform computer vision app development by building seven practical projects

Create image processing, object detection and face recognition apps by leveraging the power of machine learning and deep learning with OpenCV 4 and Qt 5

Key Features

  • Gain practical insights into code for all projects covered in this book
  • Understand modern computer vision...
Going Stealth: Transgender Politics and U.S. Surveillance Practices
Going Stealth: Transgender Politics and U.S. Surveillance Practices
In Going Stealth Toby Beauchamp demonstrates how the enforcement of gender conformity is linked to state surveillance practices that identify threats based on racial, gender, national, and ableist categories of difference. Positioning surveillance as central to our understanding of transgender politics, Beauchamp examines a...
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy