Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
React 16 Tooling: Master essential cutting-edge tools, such as create-react-app, Jest, and Flow
React 16 Tooling: Master essential cutting-edge tools, such as create-react-app, Jest, and Flow

React 16 Tooling covers the most important tools, utilities, and libraries that every React developer needs to know - in detail.

Key Features

  • Each chapter presents meta-development solutions to help React developers
  • The tools used are presented in a practical,...
Bioeffects and Therapeutic Applications of Electromagnetic Energy
Bioeffects and Therapeutic Applications of Electromagnetic Energy

From cell phones to treating cancer, EM energy plays a part in many of the innovations that we take for granted everyday. A basic force of nature, like nuclear energy or gravity, this energy can be harnessed and used, but still holds the potential to be harmful. The question remains, how safe are EM products? Bioeffects and Therapeutic...

Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems
Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems

When creating real-time and embedded (RTE) systems, there is no room for error. The nature of the final product demands that systems be powerful, efficient, and highly reliable. The constraints of processor and memory resources add to this challenge. Sophisticated developers rely on design patterns—proven solutions to...

The Next Million Years.
The Next Million Years.
WHEN anyone starts to write on a subject, at which he has not hitherto worked professionally, his proper procedure should be to set out on a long course of reading, with careful preparatory annotations of all he has read. Such a course on a tremendous subject like the present one might easily take ten years. At the time when I determined to write...
Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy...
Mastering the SAS DS2 Procedure: Advanced Data-Wrangling Techniques, Second Edi
Mastering the SAS DS2 Procedure: Advanced Data-Wrangling Techniques, Second Edi

Enhance your SAS® data-wrangling skills with high-precision and parallel data manipulation using the DS2 programming language.

Now in its second edition, this book addresses the DS2 programming language from SAS, which combines the precise procedural power and control of the Base SAS® DATA step...

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
SQL for Dummies
SQL for Dummies
Discover how SQL:2003 handles images, XML files, and more

Use SQL to build databases, keep them safe, and access their information

Relationships are everything, especially when it comes to databases – so if you work with them, form a relationship with this book. It helps you use SQL to build databases, protect them from...

Sams Teach Yourself Facebook in 10 Minutes
Sams Teach Yourself Facebook in 10 Minutes

Sams Teach Yourself Facebook in 10 Minutes offers straightforward, practical answers

when you need fast results. By working through 10-minute lessons, you’ll learn everything you

need to know to quickly and easily get up to speed with Facebook.

...
Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Buying & Selling Music, Instruments, and Music Collectibles on eBay
Buying & Selling Music, Instruments, and Music Collectibles on eBay
This book is about eBay but with a twist. The focus is on buying and selling music-related items on eBay. We found a niche and it’s all about music!

It’s always fun to write about something you love. In this case, I’m truly blessed because I’m writing about two of my favorite things: eBay and music.

So,
...
unlimited object storage image
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy