Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Perl Pocket Reference
Perl Pocket Reference

The Perl Pocket Reference is a quick reference guide to Larry Wall's Perl programming language. It contains a concise description of all statements, functions, and variables, and lots of other useful information.

The purpose of the Pocket Reference is to aid users of Perl in ®nding the syntax of...

Top 10 Brussels (Eyewitness Top 10 Travel Guides)
Top 10 Brussels (Eyewitness Top 10 Travel Guides)

Drawing on the same standards of accuracy as the acclaimed DK Eyewitness Travel Guides, each book in DK's Top 10 series uses evocative color photography, excellent cartography, and up-to-date travel content to create a reliable and useful pocket-sized travel guide.

Dozens of Top 10 lists provide vital
...

Head First Software Development (Brain-Friendly Guides)
Head First Software Development (Brain-Friendly Guides)
Even the best developers have seen well-intentioned software projects fail -- often because the customer kept changing requirements, and end users didn't know how to use the software you developed. Instead of surrendering to these common problems, let Head First Software Development guide you through the best practices of software...
bash Pocket Reference
bash Pocket Reference

It's simple: you need to know how to work with the bash shell if you want to get to the heart of Mac OS X, Linux, and other Unix systems. Updated for the most recent version of bash, this concise little book puts all of the essential information about bash at your fingertips. You'll quickly find answers to annoying questions...

The Chief Information Security Officer
The Chief Information Security Officer

The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...

  • Learn how the role...
sed, awk and Regular Expressions Pocket Reference (Pocket Reference (O'Reilly))
sed, awk and Regular Expressions Pocket Reference (Pocket Reference (O'Reilly))

For people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of performing the same edits on multiple files, and to write...

CompTIA Security+ Study Guide
CompTIA Security+ Study Guide

Prepare for CompTIA's updated Security+ exam

Validate your professional computer security expertise with certification that helps you stand out in the marketplace. This guide is your key to preparing for CompTIA's new Security+ SY0-201 exam, the first major revision of the exam since it was launched in 2002. Acquire hands-on skills and...

Python Pocket Reference (Pocket Reference)
Python Pocket Reference (Pocket Reference)

Updated for both Python 3.4 and 2.7, this convenient pocket guide is the perfect on-the-job quick reference. You’ll find concise, need-to-know information on Python types and statements, special method names, built-in functions and exceptions, commonly used standard library modules, and other prominent Python tools. The handy...

Thieme Clinical Companions Dermatology
Thieme Clinical Companions Dermatology
Dermatology, the first book in the new Thieme Clinical Companions series, presents the essential information on how to diagnose and treat the full range of dermatologic diseases.

Compiled by expert physicians, this pocket guide describes the diagnostic approach and therapeutic options for a wide range of skin diseases. More than...

Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
TOAD Handbook (2nd Edition)
TOAD Handbook (2nd Edition)

TOAD Handbook is a guide for developing Oracle applications and administering Oracle databases with TOAD. Starting with installation and configuration, the book covers the TOAD SQL editors in depth, including dozens of helpful, undocumented features. Later chapters discuss reporting and exporting data and using several add-on tools designed to...

Flash Development for Android Cookbook
Flash Development for Android Cookbook

It's taken a few years, but mobile and devices are finally hot. How hot? Like biting into a freshly ripe, raw, Habanero chili kind-a-HOT. Can you taste the virtual heat on your virtual tongue yet?

Yowza! The point I'm trying to get across is this. The broader mobile and device industry has finally gone mainstream. Why...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy