Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Your UNIX/Linux: The Ultimate Guide
Your UNIX/Linux: The Ultimate Guide

Your UNIX/Linux: The Ultimate Guide, written with both users and programmers in mind, is the ultimate UNIX/Linux text. Both pedagogical tool and exhaustive reference, it is well-suited to any course that includes UNIX or Linux. A strong pedagogical framework sets it apart from similar texts and allows beginning students to gain a firm grasp...

Bash it Out!: Strengthen your Bash knowledge with 17 scripting challenges of varied difficulties
Bash it Out!: Strengthen your Bash knowledge with 17 scripting challenges of varied difficulties

Do you want to improve your Bash skills? Be aware of the common or not-so-common pitfalls of interactive Bash usage? Or simply test your friends (and/or your employees!) with subtle brainteasers? Then, this book is for you! The goal of the book is to let you discover a thing or two about the Bash and Linux/Unix command line by solving...

Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
Pro Continuous Delivery: With Jenkins 2.0
Pro Continuous Delivery: With Jenkins 2.0
Follow this step-by-step guide for creating a continuous delivery pipeline using all of the new features in Jenkins 2.0 such as Pipeline as a Code, multi-branch pipeline, and more. You will learn three crucial elements for achieving a faster software delivery pipeline: a fungible build/test environment, manageable and reproducible...
Advanced Programming in the UNIX® Environment: Second Edition
Advanced Programming in the UNIX® Environment: Second Edition
"Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations...
RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

CompTIA Network+ N10-006 Cert Guide
CompTIA Network+ N10-006 Cert Guide

This approved study guide helps you master topics on the CompTIA Network+ N10-006 exam, including the following:

  •  Computer network fundamentals
  • The OSI model and TCP/IP stack
  • ...
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
OS X for Hackers at Heart: The Apple of Every Hacker's Eye
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research...
Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

Art of RAW Conversion: How to Produce Art-Quality Photos with Adobe Photoshop CS2 and Leading RAW Converters
Art of RAW Conversion: How to Produce Art-Quality Photos with Adobe Photoshop CS2 and Leading RAW Converters
The RAW file format used by digital cameras is essentially the raw data that a camera captures when it takes a photo. RAW files allow the digital photographer to edit and manipulate their photos with less data loss than in other file formats (such as JPEG). There are many RAW conversion tools, and it's often a good idea to use more than one to get...
Digital Character Animation 2, Volume II: Advanced Techniques (Digital Character Animation)
Digital Character Animation 2, Volume II: Advanced Techniques (Digital Character Animation)
At last, George Maestri’s advanced-techniques volume of his groundbreaking [digital] Character Animation book. Completely new: No updated material from the first volume (covering Essential Techniques) or from the first edition (published in 1996 and now out of print). If you are into 3D animation at all—learning, practicing (or managing...
Result Page: 68 67 66 65 64 63 62 61 60 59 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy