Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C in Depth :: Easy Beginner's To Expert's Guide.
C in Depth :: Easy Beginner's To Expert's Guide.

Essential C Skills-Made Easy–Without Fear!

This C Programming book gives a good start and complete introduction for C Programming for Beginner’s. Learn the all basics and advanced features of C programming in no time from Bestselling...

AWS Certified Advanced Networking Official Study Guide: Specialty Exam
AWS Certified Advanced Networking Official Study Guide: Specialty Exam

The official study guide for the AWS certification specialty exam

The AWS Certified Advanced Networking Official Study Guide – Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking – Specialty Exam. Expert review of AWS fundamentals align with the exam objectives,...

A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

Practical Guide to Salesforce Communities: Building, Enhancing, and Managing an Online Community with Salesforce Community Cloud
Practical Guide to Salesforce Communities: Building, Enhancing, and Managing an Online Community with Salesforce Community Cloud

Whether you are brand new to the world of Salesforce communities or you are looking to take your Community Cloud knowledge to the next level, this detailed guide will help you to build and manage a Salesforce community by leveraging the declarative power of the platform with clicks, not code.

Each Salesforce community is...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

Cisco® LAN Switching (CCIE Professional Development)
Cisco® LAN Switching (CCIE Professional Development)
CCIE Professional Development: Cisco LAN Switching is essential for preparation for the CCIE Routing and Switching exam track. As well as CCIE preparation, this comprehensive volume provides readers with an in-depth analysis of Cisco LAN Switching technologies, architectures and deployments. ...
A UML Pattern Language (Macmillan Technology Series)
A UML Pattern Language (Macmillan Technology Series)

This book is about how to model software systems and how to use those models. It is rooted in that emerging intellectual "ecosystem" comprising the various networks (the Internet, intranets, extranets, and so on), distributed objects, piecemeal development based on short development cycles, and something called...

The Waite Group's C Primer Plus
The Waite Group's C Primer Plus
The Waite Group’s C Primer Plus, Third Edition presents the ANSI C standard beginning with a discussion of the fundamentals of C programming and then continues on to illustrate real-world C programming concepts and techniques. The Waite Group’s C Primer Plus, Third Edition, is jam-packed with hundreds of...
Cisco Security Specialist's Guide to PIX Firewall
Cisco Security Specialist's Guide to PIX Firewall
The objective of this book is to provide you with a thorough understanding of the
Cisco PIX firewalls.Whether you have administrative responsibilities or you are
studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CPSFA),
this comprehensive guide will be of value to you.The initial chapters cover the
basics,
...
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

unlimited object storage image
Result Page: 657 656 655 654 653 652 651 650 649 648 647 646 645 644 643 642 641 640 639 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy