Home | Amazing | Today | Tags | Publishers | Years | Search 
Mastering OpenStack
Mastering OpenStack

Design, deploy, and manage a scalable OpenStack infrastructure

About This Book

  • Learn how to design and deploy an OpenStack private cloud using automation tools and best practices
  • Gain valuable insight into OpenStack components and new services
  • Explore the opportunities to...
Kali Linux Wireless Penetration Testing Essentials
Kali Linux Wireless Penetration Testing Essentials

Plan and execute penetration tests on wireless networks with the Kali Linux distribution

About This Book

  • Learn the fundamentals of wireless LAN security and penetration testing
  • Discover and attack wireless networks using specialized Kali Linux tools
  • A step-by-step,...
Advanced Location-Based Technologies and Services
Advanced Location-Based Technologies and Services

Due to the rapid increase in the number of mobile device users worldwide, location-based services (LBSs) have become pervasive, and the demand for them will continue to grow. Exploring recent changes in the technology and its uses, Advanced Location-Based Technologies and Services takes an in-depth look at new and existing...

Game Development with Three.js
Game Development with Three.js

With Three.js you can create sophisticated 3D games that run in the web browser. This book is aimed at both the professional game designer and the enthusiast with a step by step approach including lots of tips and examples.

Overview

  • Develop immersive 3D games that anyone can play on the Internet
  • ...
Windows NT in a Nutshell: A Desktop Quick Reference for System Administration (In a Nutshell (O'Reilly))
Windows NT in a Nutshell: A Desktop Quick Reference for System Administration (In a Nutshell (O'Reilly))

Anyone who installs Windows NT, creates a user, or adds a printer is an NT system administrator (whether they realize it or not). This book organizes NT's complex GUI interface, dialog boxes, and multitude of DOS-shell commands into an easy-to-use quick reference for anyone who uses or manages an NT system. It features a new...

Mastering Redmine - Second Edition
Mastering Redmine - Second Edition

Key Features

  • Learn Redmine through the basic topics to the mastering ones
  • Customize Redmine without breaking upgrade compatibility
  • Become an expert of Redmine after having read this comprehensive guide with tips, tricks and best practices.

Book Description

...

Getting Started with BeagleBone: Linux-Powered Electronic Projects With Python and JavaScript
Getting Started with BeagleBone: Linux-Powered Electronic Projects With Python and JavaScript

Many people think of Linux as a computer operating system, running on users' desktops and powering servers. But Linux can also be found inside many consumer electronics devices. Whether they're the brains of a cell phone, cable box, or exercise bike, embedded Linux systems blur the distinction between computer and device.
...

Mobile Ad Hoc Robots and Wireless Robotic Systems: Design and Implementation (Premier Reference Source)
Mobile Ad Hoc Robots and Wireless Robotic Systems: Design and Implementation (Premier Reference Source)

The emergence of wireless robotic systems has provided new perspectives on technology. With the combination of several disciplines such as robotic systems, ad hoc networking, telecommunications and more, mobile ad hoc robots have been essential towards the future possibilities of technology.

Mobile Ad Hoc Robots and Wireless...

Moodle 3 Administration - Third Edition
Moodle 3 Administration - Third Edition

Key Features

  • Learn how to plan, install, optimize, customize, and configure Moodle
  • Guarantee a cutting-edge learning experience in a secure and customizable environment while optimizing your day-to-day workload
  • A one-stop guide with a problem-solution approach and a wide range of real-world...
Secure System Design and Trustable Computing
Secure System Design and Trustable Computing

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system...

C# 6.0 in a Nutshell: The Definitive Reference
C# 6.0 in a Nutshell: The Definitive Reference

When you have questions about C# 6.0 or the .NET CLR and its core Framework assemblies, this bestselling guide has the answers you need. C# has become a language of unusual flexibility and breadth since its premiere in 2000, but this continual growth means there’s still much more to learn.

Organized around concepts...

Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali: Practical Penetration Testing Techniques

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live...

Result Page: 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy