Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On System Programming with Linux: Explore Linux system programming interfaces, theory, and practice
Hands-On System Programming with Linux: Explore Linux system programming interfaces, theory, and practice

Get up and running with system programming concepts in Linux

Key Features

  • Acquire insight on Linux system architecture and its programming interfaces
  • Get to grips with core concepts such as process management, signalling and pthreads
  • Packed with industry...
Cryptography and Security Services: Mechanisms and Applications
Cryptography and Security Services: Mechanisms and Applications
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and...
Operating Systems: Internals and Design Principles (5th Edition) (GOAL Series)
Operating Systems: Internals and Design Principles (5th Edition) (GOAL Series)
This book covers concepts, structure, and mechanisms of operating systems. Stallings presents the nature and characteristics of modern-day operating systems clearly and completely. Includes major programming projects. Offers step-by-step web support with CD/Rom Resources. A basic reference for those interested in learning...
Pro PowerShell for Microsoft Azure
Pro PowerShell for Microsoft Azure

This book is written for Windows professionals who are familiar with PowerShell and want to learn to build, operate, and administer their Windows workloads in the Microsoft cloud. Pro PowerShell for Microsoft Azure is packed with practical examples and scripts, with easy-to-follow explanations for a wide range of day-to-day...

Web Services Explained: Solutions and Applications for the Real World
Web Services Explained: Solutions and Applications for the Real World

Web services for decision makers: strategic insights and actionable recommendations.

  • How Web services will transform the way software is built, sold, implemented, and managed
  • All you need to know to plan an intelligent Web services strategy
  • Risks and pitfalls in current WebsServices...
Taking Your iPad to the Max (Technology in Action)
Taking Your iPad to the Max (Technology in Action)

It looks different. It acts different. There’s no right way to hold it. It responds to the touch of your fingertips. It’s the Internet in your lap. It connects to the world, yet it is as personal as a well-worn book.

Taking Your iPad to the Max is written so that anyone, from a computer- savvy teenager to
...

Moodle 2 Administration
Moodle 2 Administration
Moodle has evolved from an academic project to the world's most popular Virtual Learning Environment (VLE). During this evolution, its complexity has risen dramatically and so have the skills that are required to administer the system.

Moodle 2 Administration is a complete, practical guide for administering Moodle
...
Learning Web-based Virtual Reality: Build and Deploy Web-based Virtual Reality Technology
Learning Web-based Virtual Reality: Build and Deploy Web-based Virtual Reality Technology

Create web-based VR applications and deploy them to GitHub pages with this short, practical tutorial crammed with hands-on examples. This book covers topics such as VR, the WebVR API, and A-Frame. In Learning Web-based Virtual Reality, you will build a number of 3D VR-based applications. In these apps, you will be able to test the VR...

Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Inside Internet Security: What Hackers Don't Want You To Know
Inside Internet Security: What Hackers Don't Want You To Know
This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business....
Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
Internet Communication and Qualitative Research: A Handbook for Researching Online (New Technologies for Social Research series)
Internet Communication and Qualitative Research: A Handbook for Researching Online (New Technologies for Social Research series)
"The internet is exploding with possibilities for conducting social research. Mann and Stewart offer the first in-depth consideration of the prospects and potentials for doing qualitative research on-line. This wide ranging, clearly-written book is essential reading for researchers working at the cutting edge of qualitative methodology."...
unlimited object storage image
Result Page: 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy