Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Textbook of Modern Toxicology
A Textbook of Modern Toxicology
A state-of-the-art toxicology textbook—ideal for students and professionals

Toxicology is a multifaceted field that encompasses the physical and chemical study of all known poisonous substances. It involves the rigorous analysis of toxicants and their effects on living tissues, forensic toxicology, quality assurance...

Novell Certified Linux 9 (CLE 9) Study Guide
Novell Certified Linux 9 (CLE 9) Study Guide

Welcome to the world of Linux! As you will see in later chapters of this book, Novell has yet again revolutionized the Information Technology industry by providing one of the finest Linux distributions available: SUSE LINUX Enterprise Server 9 (SLES 9).

By providing an inexpensive, yet highly stable and scalable network operating system,...

How Google Tests Software
How Google Tests Software

 

Software development is hard. Testing that software is hard, too. And when you talk about development and testing at the scale of the entire web, you are talking about Google. If you are interested in how one of the biggest names in the Internet handles such large-scale testing, then you have found the right
...
How to Pass Data Interpretation Tests: Unbeatable Practice for Numerical and Quantitative Reasoning and Problem Solving Tests (Testing Series)
How to Pass Data Interpretation Tests: Unbeatable Practice for Numerical and Quantitative Reasoning and Problem Solving Tests (Testing Series)
This book provides everything you need for a successful programme of revision or review. It contains 330 practice questions with answers and explanations, advice on how to show your true potential and signposts to sources of further practice material.

Tests of data interpretation are fast
...
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

Distributed Computing with Go: Practical concurrency and parallelism for Go applications
Distributed Computing with Go: Practical concurrency and parallelism for Go applications

A tutorial leading the aspiring Go developer to full mastery of Golang's distributed features.

Key Features

  • This book provides enough concurrency theory to give you a contextual understanding of Go concurrency
  • It gives weight to synchronous and asynchronous data...
Vue.js 2 Design Patterns and Best Practices: Build enterprise-ready, modular Vue.js applications with Vuex and Nuxt
Vue.js 2 Design Patterns and Best Practices: Build enterprise-ready, modular Vue.js applications with Vuex and Nuxt

Become an expert Vue developer by understanding the design patterns and component architecture of Vue.js to write clean and maintainable code.

Key Features

  • Craft highly modular applications by exploring the design patterns and component architecture of Vue.js
  • Enforce a...
An Introduction to Ultra Wideband Communication Systems
An Introduction to Ultra Wideband Communication Systems

The definitive, end-to-end guide to high-performance UWB system design

With the FCC's approval of new ultra wideband standards, UWB is poised to drive breakthroughs in both commercial and military communications. However, UWB system design is radically different from...

Open Source GIS: A GRASS GIS Approach (The International Series in Engineering and Computer Science)
Open Source GIS: A GRASS GIS Approach (The International Series in Engineering and Computer Science)
GRASS GIS software was developed in response to the need for improved
analysis of landscape “trade offs” in managing government lands and the
emerging potential of computer-based land analysis tools. During the last
decades of the 20th century, government land managers in the U.S. (and
across the world) faced
...
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
Python: Create - Modify - Reuse
Python: Create - Modify - Reuse

Python: Create-Modify-Reuse

Aimed at all levels of Python developers who are interested in a task-based way of learning Python development, this hands-on book shows how you can efficiently use Python to create robust, real-world applications. After a brief primer on this object-oriented, interactive programming...

IBM Cognos 8 Report Studio Cookbook
IBM Cognos 8 Report Studio Cookbook

Cognos Report Studio is widely used for creating and managing business reports in medium to large companies. It is simple enough for any business analyst, power user, or developer to pick up and start developing basic reports. However, when it comes to developing more sophisticated, fully functional business reports for wider audiences,...

unlimited object storage image
Result Page: 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy