Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Linux Command Line: A Complete Introduction
The Linux Command Line: A Complete Introduction

You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line.

The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way...

Interprocess Communications in Linux®: The Nooks & Crannies
Interprocess Communications in Linux®: The Nooks & Crannies

The topic of interprocess communication techniques is broad, challenging and dynamic. All but the most basic operating systems provide methods for processes communication. Early on, UNIX supported a number of rudimentary process communication constructs (such as lock files, signals and pipes). In the early 1980s, facilities such...

Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Learn to Program (Pragmatic Programmers)
Learn to Program (Pragmatic Programmers)
It's now easier to learn to write your own computer software than it has ever been before. Now everyone can learn to write programs for themselves--no previous experience is necessary. Chris Pine takes a thorough, but light-hearted approach that teaches you how to program with a minimum of fuss or bother. Starting with small, simple one-line...
Hadoop Operations and Cluster Management Cookbook
Hadoop Operations and Cluster Management Cookbook

We are facing an avalanche of data. The unstructured data we gather can contain many insights that could hold the key to business success or failure. Harnessing the ability to analyze and process this data with Hadoop is one of the most highly sought after skills in today's job market. Hadoop, by combining the computing and storage powers...

C Traps and Pitfalls
C Traps and Pitfalls
C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual behavior of a program to differ. The book's experienced author, Koenig, follows up with examples and helpful advice on many of these "pitfalls." Each chapter includes exercises for...
Python for Unix and Linux System Administration
Python for Unix and Linux System Administration
Python is an ideal language for solving problems, especially in Linux and Unix networks. With this pragmatic book, administrators can review various tasks that often occur in the management of these systems, and learn how Python can provide a more efficient and less painful way to handle them.

Each chapter in Python for Unix and
...
Beginning Modern Unix: Learn to Live Comfortably in a Modern Unix Environment
Beginning Modern Unix: Learn to Live Comfortably in a Modern Unix Environment

Discover how to leverage modern Unix even if you’ve never worked with Unix before. This book presents everything in conceptual terms that you can understand, rather than tips to be committed raw to memory.

You will learn everyday tasks ranging from basic system administration?partitioning and mounting filesystems,...

SQL: The Complete Reference, Second Edition
SQL: The Complete Reference, Second Edition
The Most Comprehensive SQL Resource Available

Get in-depth details on all the powerful features and capabilities of SQL inside this one-stop guide. Featuring broad coverage of every aspect of this leading database language, this book provides you with an overview of SQL then shows you how to retrieve and update data, program with SQL, use...

Solaris 8: The Complete Reference
Solaris 8: The Complete Reference
Clients often ask why we choose Solaris as an operating environment. Is it a decision based on price? Is it an attraction to the latest gizmo features, each with its own four-letter acronym? Do we have a cozy arrangement with Sun Microsystems to promote their operating system? The answer to each of these questions is no, no, NO!  ...
Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Result Page: 70 69 68 67 66 65 64 63 62 61 60 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy