Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical IDL Programming
Practical IDL Programming
his book provides a solid foundation in the fundamentals of programming in Interactive Data Language (IDL), an array-oriented data analysis and visualization environment developed and marketed by Research Systems, Incorporated (RSI) of Boulder, Colorado. IDL is available for Windows, MacOS, UNIX (including Linux), and VMS platforms.

The
...
Implementing ITIL Configuration Management
Implementing ITIL Configuration Management
Practical, Real-World ITIL Configuration Management–From Start to Finish

 

The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively,...

Oracle PL/SQL Language Pocket Reference
Oracle PL/SQL Language Pocket Reference
The fourth edition of this popular pocket guide provides quick-reference information that will help you use Oracle's PL/SQL language, including the newest Oracle Database 11g features. It's a companion to Steven Feuerstein and Bill Pribyl's bestselling Oracle PL/SQL Programming.

This concise guide boils down the most vital
...
How to Do Everything with Google Tools
How to Do Everything with Google Tools
Nearly twenty years ago I was introduced to a fascinating new technology that has now become part of our everyday activity. At the time, I thought it was extremely cool to log into a distant server and read stuff. At the time, that stuff came at a hefty price—Internet time was over $2.00 per hour, connection speeds were measured in bauds, and...
Web Application Vulnerabilities: Detect, Exploit, Prevent
Web Application Vulnerabilities: Detect, Exploit, Prevent
This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,...
PHP Programming Solutions
PHP Programming Solutions
If you’re reading this book, you probably already know what PHP is—one of the world’s most popular programming languages for Web application development. Widely available and backed by the support of a vociferous and enthusiastic user community, the language was in use on more than 20 million Web sites at the end of...
Network Performance Analysis: Using the J Programming Language
Network Performance Analysis: Using the J Programming Language
The J programming laguage is rich in mathematical functionality and ideally suited to analytical computing methods. It is, however, a somewhat terse language and not entirely intuitive at first, particularly if one is used to more conventional programming languages such as C, Pascal or Java. J functions (called verbs) are denoted by punctuation...
Computer Network Time Synchronization: The Network Time Protocol
Computer Network Time Synchronization: The Network Time Protocol
This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling...
Linux For Dummies 8th Edition
Linux For Dummies 8th Edition

Everything you need to install, run, and optimize Linux on your desktop

Here's how to start using Linux, the popular and free operating system

Want to do the same tasks you can with Windows, except for free? Linux is the alternative open source operating system that's beloved by users...

Why Programs Fail: A Guide to Systematic Debugging
Why Programs Fail: A Guide to Systematic Debugging
Why Programs Fail is about bugs in computer programs, how to find them, how to reproduce them, and how to fix them in such a way that they do not occur anymore. This is the first comprehensive book on systematic debugging and covers a wide range of tools and techniques ranging from hands-on observation to fully automated diagnoses,...
CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
OpenGL(R) SuperBible: Comprehensive Tutorial and Reference (4th Edition)
OpenGL(R) SuperBible: Comprehensive Tutorial and Reference (4th Edition)
OpenGL ® SuperBible, Fourth Edition, begins by illuminating the core techniques of “classic” OpenGL graphics programming, from drawing in space to geometric transformations, from lighting to texture mapping. The authors cover newer OpenGL capabilities, including OpenGL 2.1’s...
Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy