Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
For many years the RHCE from Red Hat has been based on managing services on a single Red Hat host. The big question is: how many RHCEs manage just a single host? With that in mind, Red Hat has updated the exam and training to support Ansible, allowing you to learn to manage many hosts.

Ansible is a configuration
...
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit
Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit

Add cybersecurity to your value proposition and protect your company from cyberattacks

Cybersecurity is now a requirement for every company in the world regardless of size or industry. Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit covers everything a founder, entrepreneur and...

Starting Out or Starting Over: Top 10 Tips for Runners: Advice, Injuries, & Support. Plus! Bonus Habit Shaper and Willpower Builder
Starting Out or Starting Over: Top 10 Tips for Runners: Advice, Injuries, & Support. Plus! Bonus Habit Shaper and Willpower Builder

THE IDEA FOR THIS BOOK literally came to me in the middle of the night. That creative part of my brain insisted that I get up and make some damn notes. In that sleepy fog, I saw myself crafting this little book along with its siblings – of course, it’s a series! I imagined them like little messengers, offering valuable...

Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development

Understand the Blockchain revolution and get to grips with Ethereum, Hyperledger Fabric, and Corda.

Key Features

  • Resolve common challenges and problems faced in the Blockchain domain
  • Study architecture, concepts, terminologies, and Dapps
  • Make smart choices...
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from...
Good Thinking: Why Flawed Logic Puts Us All at Risk and How Critical Thinking Can Save the World
Good Thinking: Why Flawed Logic Puts Us All at Risk and How Critical Thinking Can Save the World
Good Thinking is our best defense against anti-vaccine paranoia, climate denial, and other dire threats of today

Publisher’s Note: Good Thinking was previously published in the UK as The Irrational Ape.

In our ever-more-polarized society, there’s at least one thing we
...
Philosophy of Time (Routledge Contemporary Introductions to Philosophy)
Philosophy of Time (Routledge Contemporary Introductions to Philosophy)

As a growing area of research, the philosophy of time is increasingly relevant to different areas of philosophy and even other disciplines. This book describes and evaluates the most important debates in philosophy of time, under several subject areas: metaphysics, epistemology, physics, philosophy of language, philosophy of mind,...

Cisco IP Telephony: Planning, Design, Implementation, Operation, and Optimization
Cisco IP Telephony: Planning, Design, Implementation, Operation, and Optimization

The comprehensive guide to planning and implementing your Cisco IP Telephony system, as shown by the experts.

  • Understand how to work through the different implementation phases of a Cisco IP telephony solution

  • Plan your implementation...

Windows Server 2003 Security : A Technical Reference
Windows Server 2003 Security : A Technical Reference

This book is not designed with the Windows end user, advanced or not, in mind. It is meant for the server administrator, network administrator, security administrator, IT manager, technology specialist, or other individual who must design, implement, troubleshoot, or configure the security of Windows Server 2003 or the...

Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)
Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)
Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Fully updated for today's key threats, tools, and solutions, this book shows you how hackers...
Network Programming for Microsoft Windows (Microsoft Professional Series)
Network Programming for Microsoft Windows (Microsoft Professional Series)
Welcome to Network Programming for Microsoft Windows! This book covers a wide variety of networking functions available in Windows 95, Windows 98, Windows NT 4, Windows 2000, and Windows CE. The text is designed with the intermediate to advanced programmer in mind, but beginning programmers will find it a useful reference and a...
Programming Windows With MFC
Programming Windows With MFC

Like many of my colleagues in this industry, I learned Windows programming from Charles Petzold's Programming Windows—a classic programming text that is the bible to an entire generation of Windows programmers. When I set out to become an MFC programmer in 1994, I went shopping for an MFC equivalent to Programming...

unlimited object storage image
Result Page: 97 96 95 94 93 92 91 90 89 88 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy