Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies
DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies

Explore the high-in demand core DevOps strategies with powerful DevOps tools such as Ansible, Jenkins, and Chef

Key Features

  • Get acquainted with methodologies and tools of the DevOps framework
  • Perform continuous integration, delivery, deployment, and monitoring using...
Running Mac OS X Panther
Running Mac OS X Panther
Apple® has shown no mercy to the Macintosh® power user---that dedicated individual who knows their Mac® inside and out: what makes it tick, and what makes it tick better. In the rapid evolution of Mac OS® X, there have been three major releases, and each new release challenges the power user to once more stay ahead of the learning...
Computer Network Security
Computer Network Security
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and...
Cdma Mobile Radio Design (Artech House Telecommunications Library)
Cdma Mobile Radio Design (Artech House Telecommunications Library)
Wireless communications is growing at a phenomenal rate. From 1991 to 1999, the number of subscribers increased from about 25 million to over 250 million. Incredibly, over the next seven years, the number. of subscribers is expected to quadruple, to over 1 billion [ 1]. That growth rate is faster than that of any other consumer...
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...

The qmail Handbook
The qmail Handbook
  • Provides thorough instruction for installing, configuring, and optimizing qmail
  • Includes coverage of secure networking, troubleshooting issues, and mailing list administration
  • Covers what system administrators want to know by concentrating on qmail issues relevant to daily operation
  • ...
Introduction to Web Matrix
Introduction to Web Matrix
The essential introduction to using Microsoft's Web Matrix tool for ASP.NET development

An Introduction to Web Matrix provides an easy to follow treatment of the application of this new software, which is rapidly becoming the preferred vehicle for the teaching of website design. Written
...
Perioperative Care of the Child: A Nursing Manual
Perioperative Care of the Child: A Nursing Manual

Edited by well-known and highly-regarded children’s nurse Linda Shields, Perioperative Care of the Child is an essential resource for any children’s nurse working in a perioperative setting and all student nurses on the child branch. This timely and valuable text provides comprehensive coverage of the essential skills and...

Soldier, Sailor, Frogman, Spy, Airman, Gangster, Kill or Die: How the Allies Won on D-Day
Soldier, Sailor, Frogman, Spy, Airman, Gangster, Kill or Die: How the Allies Won on D-Day

A ground-breaking account of the first 24 hours of the D-Day invasion told by a symphony of incredible accounts of unknown and unheralded members of the Allied – and Axis – forces.

An epic battle that involved 156,000 men, 7,000 ships and 20,000 armoured vehicles, D-Day was, above all, a tale of
...

Human Reliability and Error in Transportation Systems (Springer Series in Reliability Engineering)
Human Reliability and Error in Transportation Systems (Springer Series in Reliability Engineering)
Each year billions of dollars are being spent to develop, manufacture, and operate transportation systems such as aircraft, ships, trains, and motor vehicles throughout the world. During their operation thousands of lives are lost annually due to various types accidents. Needless to say, approximately 70 to 90 percent of transportation crashes are...
Moodle 2.0 First Look
Moodle 2.0 First Look

The book looks at the main functional areas of Moodle that have significant new features, explains the new features and how to use them. It draws attention to significant differences from how things used to behave, and gives the reader an idea of the kind of consequences these changes will bring to them. If you are an existing Moodle user,...

Web Application Architecture: Principles, Protocols and Practices
Web Application Architecture: Principles, Protocols and Practices

In-depth examination of concepts and principles of Web application development

Completely revised and updated, this popular book returns with coverage on a range of new technologies. Authored by a highly respected duo, this edition provides an in-depth examination of the core concepts and general principles of Web application...

unlimited object storage image
Result Page: 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy