Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Optimized C++: Proven Techniques for Heightened Performance
Optimized C++: Proven Techniques for Heightened Performance

In today’s fast and competitive world, a program’s performance is just as important to customers as the features it provides. This practical guide teaches developers performance-tuning principles that enable optimization in C++. You’ll learn how to make code that already embodies best practices of C++ design run...

Exploring the Raspberry Pi 2 with C++
Exploring the Raspberry Pi 2 with C++

You have a Pi 2, but what exactly can you do with it? This book takes you on a tour of the Pi 2 hardware and all of the fantastic things that you can do to create innovative and useful projects with your Pi. Start with creating a workstation that does actual work, and move into installing a custom kernel, creating a clock, learning the ins...

ArcGIS for JavaScript developers by Example
ArcGIS for JavaScript developers by Example

Key Features

  • Unshackle your GIS application from a workstation! Get running with three major web mapping projects covering all the important aspects of the ArcGIS JavaScript API.
  • Set a strong foundation for the ArcGIS JavaScript API and modular coding with dojo.
  • Gain a crystal clear...
Nuendo Power!
Nuendo Power!
Whether you are a musician, recording engineer, sound designer, video editor, or other type of
media author, certainly you have noticed that the demands of audio production in today’s multimedia
environment have increased dramatically. With the proliferation of surround sound systems in theaters,
homes, and specialized
...
The Book of VMware: The Complete Guide to VMware Workstation
The Book of VMware: The Complete Guide to VMware Workstation

There's only so much you can do by multitasking applications. Frequently, you just need another computer for testing software, trying out network configurations, or doing any of a dozen things that engineers and administrators need to do. VMware allows you to run several virtual machines on one physical computer, each completely...

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

Linux HPC Cluster Installation
Linux HPC Cluster Installation
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...
Red Hat Fedora Linux 3 Bible
Red Hat Fedora Linux 3 Bible
If Fedora Linux 3 can do it, you can do it too ...

Fedora Core 3 is Red Hat's most solid Fedora to date, including features destined for Red Hat Enterprise Linux 4. Use Fedora Core 3, with the latest Linux technology, to set up a personal desktop, small business server, or programming workstation. This book will teach you the basics of using...

Moving Media Storage Technologies: Applications & Workflows for Video and Media Server Platforms
Moving Media Storage Technologies: Applications & Workflows for Video and Media Server Platforms

Storage technologies have fundamentally changed the landscape of digital media in a profound way. Gone are the days of using a single hard disk drive on a workstation as the sole means to store digital content. Nearly vanished is the practice of capturing video and audio only on videotape. The practice of transferring videotape...

Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
New Programmer's Survival Manual: Navigate Your Workplace, Cube Farm, or Startup (Pragmatic Programmers)
New Programmer's Survival Manual: Navigate Your Workplace, Cube Farm, or Startup (Pragmatic Programmers)

It's your first day on the new job. You've got the programming chops, you're up on the latest tech, you're sitting at your workstation... now what? New Programmer's Survival Manual gives your career the jolt it needs to get going: essential industry skills to help you apply your raw programming talent and...

Linux in a Windows World
Linux in a Windows World
The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment. This book takes an in-depth look at exactly how Linux can be brought into an organization that's currently based...
Result Page: 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy