Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Network Programming: Conquer all your networking challenges with the powerful Python language
Python Network Programming: Conquer all your networking challenges with the powerful Python language

Power up your network applications with Python programming

Key Features

  • Master Python skills to develop powerful network applications
  • Grasp the fundamentals and functionalities of SDN
  • Design multi-threaded, event-driven architectures for echo and chat...
Command Line Fundamentals: Learn to use the Unix command-line tools and Bash shell scripting
Command Line Fundamentals: Learn to use the Unix command-line tools and Bash shell scripting

Master shell basics and Unix tools and discover easy commands to perform complex tasks with speed

Key Features

  • Learn why the Bash shell is widely used on Linux and iOS
  • Explore advanced shell concepts, such as pipes and redirection
  • Understand how to use...
Bash Quick Start Guide: Get up and running with shell scripting with Bash
Bash Quick Start Guide: Get up and running with shell scripting with Bash

Learn how to write shell script effectively with Bash, to quickly and easily write powerful scripts to manage processes, automate tasks, and to redirect and filter program input and output in useful and novel ways.

Key Features

  • Demystify the Bash command line
  • Write shell...
Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang
Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang

Explore the fundamentals of systems programming starting from kernel API and filesystem to network programming and process communications

Key Features

  • Learn how to write Unix and Linux system code in Golang v1.12
  • Perform inter-process communication using pipes, message...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Fundamentals of Linux: Explore the essentials of the Linux command line
Fundamentals of Linux: Explore the essentials of the Linux command line

Develop a solid understanding of the important command-line tools and utilities in Linux

Key Features

  • Delve into the fundamentals of Linux
  • Explore and work with virtualization, command lines, and Bash shell scripts
  • Use special file permission flags such as...
Wicked Cool Shell Scripts
Wicked Cool Shell Scripts

This cookbook of useful, customizable, and fun scripts gives you the tools to solve common Linux, Mac OS X and UNIX problems and personalize your computing environment.

The UNIX shell is the main scripting environment of every Linux, Mac OS X and UNIX system, whether a rescued laptop or a million-dollar mainframe. This cookbook of...

UNIX and Linux System Administration Handbook (5th Edition)
UNIX and Linux System Administration Handbook (5th Edition)

UNIX® and Linux® System Administration Handbook, Fifth Edition, is today’s definitive guide to installing, configuring, and maintaining any UNIX or Linux system, including systems that supply core Internet and cloud infrastructure.

 

...
Modern C Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library
Modern C Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library

Discover how C's efficiency makes it a popular choice in a wide variety of applications and operating systems with special applicability to wearables, game programming, system level programming, embedded device/firmware programming and in Arduino and related electronics hobbies in this condensed code and syntax guide. This book...

Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Bounce, Tumble, and Splash!: Simulating the Physical World with Blender 3D
Bounce, Tumble, and Splash!: Simulating the Physical World with Blender 3D
Learn all about Blender, the premier open-source 3D software, in Bounce, Tumble, and Splash!: Simulating the Physical World with Blender 3D. You will find step-by-step instructions for using Blender’s complex features and full-color visual examples with detailed descriptions of the processes. If you’re an advanced...
vi and Vim Editors Pocket Reference: Support for every text editing task
vi and Vim Editors Pocket Reference: Support for every text editing task

Many Unix, Linux, and Mac OS X geeks enjoy using the powerful, platform-agnostic text editors vi and Vim, but there are far too many commands for anyone to remember. Author Arnold Robbins has chosen the most valuable commands for vi, Vim, and vi's main clones—vile, elvis, and nvi—and packed them into this...

Result Page: 69 68 67 66 65 64 63 62 61 60 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy