Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Docker in Practice
Docker in Practice

Summary

An open source container system, Docker makes deploying applications painless and flexible. Docker is powerful and simple to use, and it makes life easier for developers and administrators alike providing shorter build times, fewer production bugs, and effortless application roll-out.

About...

Build Supercomputers with Raspberry Pi 3
Build Supercomputers with Raspberry Pi 3

Key Features

  • Carlos R. Morrison from NASA will teach you to build a supercomputer with Raspberry Pi 3
  • Deepen your understanding of setting up host nodes, configuring networks, and automating mountable drives
  • Learn various math, physics, and engineering applications to solve complex...
1337 h4x0r h4ndb00k
1337 h4x0r h4ndb00k
This is your ticket into the elusive underworld of the Internet, home to millions of elite computer hackers. 1337 h4x0r h4ndb00k will show you how to walk-the-walk and talk-the-talk of this exclusive community. Soon, you too will be able to go into a chat room and carry on conversations speaking the cryptic 1337...
Black & Decker The Book of Home Improvement: The Most Popular Remodeling Projects Shown in Full Detail
Black & Decker The Book of Home Improvement: The Most Popular Remodeling Projects Shown in Full Detail
This comprehensive guide to home improvement includes the top 100 home improvement projects, all in full, step-by-step instruction, and all from the trusted experts at BLACK+DECKER.

Boasting 560 pages of hardworking, how-to instructions and photos, this is quite possibly the only home remodeling you, or any
...
Novel Algorithms and Techniques in Telecommunications and Networking
Novel Algorithms and Techniques in Telecommunications and Networking
This book includes the proceedings of the 2008 International Conference on Telecommunications and Networking (TeNe).

TeNe 08 is part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 08).
...
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Arduino: A Quick-Start Guide
Arduino: A Quick-Start Guide

Arduino is an open-source platform that makes DIY electronics projects easier than ever. Gone are the days when you had to learn electronics theory and arcane programming languages before you could even get an LED to blink. Now, with this new edition of the bestsellingArduino: A Quick-Start Guide, readers with no electronics experience...

Handbook of Autopsy Practice
Handbook of Autopsy Practice

In Handbook of Autopsy Practice, Third Edition, Jurgen Ludwig, MD, has painstakingly updated and expanded his recognized "masterpiece" to create an indispensable and invaluable source of classic and innovative procedures for successful autopsy diagnosis and documentation. The section on autopsy methods has been modernized with...

Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems
Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems

When creating real-time and embedded (RTE) systems, there is no room for error. The nature of the final product demands that systems be powerful, efficient, and highly reliable. The constraints of processor and memory resources add to this challenge. Sophisticated developers rely on design patterns—proven solutions to...

Room Acoustical Fields
Room Acoustical Fields

This book presents the theory of room acoustical fields and revises the Mirror Source Methods for practical computational use, emphasizing the wave character of acoustical fields.  The presented higher methods include the concepts of “Mirror Point Sources” and “Corner sources which allow for an excellent approximation...

Digital Addiction: Breaking Free from the Shackles of the Internet, TV and Social Media
Digital Addiction: Breaking Free from the Shackles of the Internet, TV and Social Media

Digital addiction is a very real threat.


Find freedom today and get addiction treatment for video game addiction, technology addiction, cell phone addiction, internet addiction, and social media addiction with this powerful book!

Do you find yourself struggling to break free from TV,...

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy