Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Broadband over Power Line
Understanding Broadband over Power Line
Understanding Broadband over Power Line explores all aspects of the emerging technology that enables electric utilities to provide support for high-speed data communications via their power infrastructure. This book examines the two methods used to connect consumers and businesses to the Internet through the utility infrastructure: the existing...
Mastering Python Regular Expressions
Mastering Python Regular Expressions

For Python developers, this concise and down-to-earth guide to regular expressions is all you need to gain vital new knowledge. From a theoretical overview to Python specifics, it explains everything in crystal clear language.

Overview

  • Explore the workings of Regular Expressions in Python
  • ...
The BIOS Companion: The book that doesn't come with your motherboard!
The BIOS Companion: The book that doesn't come with your motherboard!
The instructions that turn a PC into a useful machine come in three stages, starting with application programs, which are loaded by an operating system, which in turn is loaded by a bootstrap loader in the BIOS (the Basic Input/Output System). There are several in a PC, a good example being the one on the video card that controls the interface...
Python Unlocked
Python Unlocked

Key Features

  • Write smarter, bug-free, high performance code with minimal effort
  • Uncover the best tools and options available to Python developers today
  • Deploy decorators, design patters, and various optimization techniques to use Python 3.5 effectively

Book...

Water Quality & Treatment: A Handbook on Drinking Water
Water Quality & Treatment: A Handbook on Drinking Water

This sixth edition of Water Quality & Treatment: A Handbook on Drinking Water serves as a handbook for scientists, engineers, and other professionals who study and work in drinking water—particularly the quality of water supplies, the quality of treated drinking water, and water treatment processes. It is meant as a resource for...

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the...

Lex & Yacc (A Nutshell Handbook)
Lex & Yacc (A Nutshell Handbook)

This book shows you how to use two Unix utilities, lex and yacc, in program development. These tools help programmers build compilers and interpreters, but they also have a wider range of applications. The second edition contains completely revised tutorial sections for novice users and reference sections for advanced users....

Professional Linux Programming (Programmer to Programmer)
Professional Linux Programming (Programmer to Programmer)

As Linux continues to grow in popularity, there has never been more of a need to understand how to develop for this platform. Rather than focusing on a particular language or development technique, Professional Linux Programming looks at the different development environments within Linux—the kernel, the desktop, and the web—and...

Eclipse for Dummies
Eclipse for Dummies
That’s what New York City Mayor Fiorello LaGuardia said back in 1934. Not
many people understood the meaning or the impact of Mayor LaGuardia’s
statement, because he said it in Latin. (“E finita la cuccagna,” said the mayor.)
But today, most people agree with the spirit of LaGuardia’s proclamation....
Buying a Computer for Dummies, 2005 Edition
Buying a Computer for Dummies, 2005 Edition
CPU, Ghz, Mhz, DIMMS, RAM, ROM, AGP, ISA, PCI, USB, CRT, LCD, NIC, CCD, CIS, DP, Kbps. What do all of these acronyms mean?

Are you baffled by computer technology and technology? Intimidated by computer salespeople who grimace or grin when you say “gizmo?” Buying a Computer For Dummies 2005 Edition gives you the ABCs of...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy