Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Official Ubuntu Server Book, The (2nd Edition)
Official Ubuntu Server Book, The (2nd Edition)

Ubuntu Server is a complete, free server operating system that just works, with the extra Ubuntu polish, innovation, and simplicity that administrators love.

Now, there’s a definitive, authoritative guide to getting up-and-running quickly with the newest, most powerful versions of Ubuntu Server. Written...

VMware Cookbook: A Real-World Guide to Effective VMware Use
VMware Cookbook: A Real-World Guide to Effective VMware Use

With scores of step-by-step solutions, this cookbook helps you work with VMware ESXi in a wide range of network environments. You’ll not only learn the basics—how to pool resources from hardware servers, computer clusters, networks, and storage, and then distribute them among virtual machines—but also how to...

Fault Analysis in Cryptography (Information Security and Cryptography)
Fault Analysis in Cryptography (Information Security and Cryptography)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...

Mastering PostgreSQL 11: Expert techniques to build scalable, reliable, and fault-tolerant database applications, 2nd Edition
Mastering PostgreSQL 11: Expert techniques to build scalable, reliable, and fault-tolerant database applications, 2nd Edition

Master the capabilities of PostgreSQL 11 to efficiently manage and maintain your database

Key Features

  • Master advanced concepts of PostgreSQL 11 with real-world datasets and examples
  • Explore query parallelism, data replication, and database performance while working with...
Murach's SQL Server 2008 for Developers (Murach: Training & Reference)
Murach's SQL Server 2008 for Developers (Murach: Training & Reference)
This book is designed to teach application developers all of the skills they need to use SQL to work with a Microsoft SQL Server 2008 database. But it's also a great first book for developers who are on the path to becoming a DBA.

Unlike most SQL Server 2008 books, this one starts by showing you how to use SQL queries to...

Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach (SpringerBriefs in Speech Technology)
Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach (SpringerBriefs in Speech Technology)
This book discusses digital audio watermarking copyright assurance. The author first outlines the topic of watermarking data that can be used for copyright assurance that incorporates text messages, copyright audio, handwritten text, logo and cell phone numbers. The objective of this book is to propose a new algorithm that can embed and extract...
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
Early in 2020, the world began suffering from a viral pandemic known as COVID-19. The world shut down, and people were ordered to shelter in place in their homes. Many jobs were lost or furloughed until the quarantine was lifted, but many employers were able to transition to a “work from home” structure. Internet...
ASP.NET v. 2.0-The Beta Version (2nd Edition) (Microsoft Net Development Series)
ASP.NET v. 2.0-The Beta Version (2nd Edition) (Microsoft Net Development Series)

In this book, three world-class ASP.NET experts present a start-to-finish, developer-focused preview of Microsoft's latest Web development breakthrough: ASP.NET 2.0.

The first book to fully reflect the new ASP.NET 2.0 Beta, ASP.NET v. 2.0—The Beta Version...

Exploring the JDS Linux Desktop
Exploring the JDS Linux Desktop
The ideal guide to JDS, Exploring the JDS Linux Desktop is clear and direct, and carefully covers such housekeeping chores as setting up networking, updates, and backups. It enters into great depth concerning the key productivity tools every user needs: email, web browsing, instant messaging, word processing,...
The Web Testing Companion: The Insider's Guide to Efficient and Effective Tests
The Web Testing Companion: The Insider's Guide to Efficient and Effective Tests
Practical, hands-on techniques for testing the design, globalization, performance, and security of Web applications

Whether you’re a novice or experienced Web tester, this hands-on guide provides you with the practical steps you’ll need to follow to rigorously test across multiple platforms and browsers. Written by one of...

Beginning Ajax with PHP: From Novice to Professional
Beginning Ajax with PHP: From Novice to Professional

Ajax breathes new life into web applications by transparently communicating and manipulating data in conjunction with a server-based technology. Of all the server-based technologies capable of working in conjunction with Ajax, perhaps none are more suitable than PHP, the world's most popular scripting language.

Beginning Ajax with...

Handbook of Database Security: Applications and Trends
Handbook of Database Security: Applications and Trends
Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of...
unlimited object storage image
Result Page: 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy