Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cfengine 3 Beginner's Guide
Cfengine 3 Beginner's Guide
This book starts off with step-by-step instructions for installing and configuring the CFEngine server and clients, and then moves on to configuring systems using CFEngine scripts. The author then walks you through the policy decision flow as well as conducting system and security audits.

This is followed by
...
iOS 5 Core Frameworks: Develop and Design: Working with graphics, location, iCloud, and more
iOS 5 Core Frameworks: Develop and Design: Working with graphics, location, iCloud, and more

Everyone seems to have an opinion as to why their favorite mobile platform is better than the others. Some prefer iOS, others choose Android—each platform has its pros and cons. For me, however, iOS stands above the rest in large part due to its use of powerful native frameworks.

Sure, frameworks and...

Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
The expansion of our reliance on software in many aspects of modern society has coincided with a number of incidents in aeronautics, astronautics, transportation, medical devices, energy generation, banking and finance. Failures caused by software have introduced more than just inconvenience, but significant property damage,...
Unlocking the Enterpriser Inside!: A Book of Why, What and How!
Unlocking the Enterpriser Inside!: A Book of Why, What and How!

This book is based on a highly successful joint project between the University of Cambridge and the Massachusetts Institute of Technology (MIT), under the auspices of the Cambridge-MIT Institute. The project brings together communities of highly diverse individuals to share and learn how to be enterprising. It has run 17 times with the...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

CIOs at Work
CIOs at Work

In CIOs at Work, noted author Ed Yourdon interviews many of the world's most influential chief information officers. You will gain insights from the first CIO of the USA, take a peek into the future with the CIO at Google, learn the unique role IT plays in testing Microsoft applications, and much more.

...

Future-Proof Web Design
Future-Proof Web Design

Best practices for flexible design that meet common challenges

The web is constantly changing and evolving with an increased range of devices, browsers, and standards that need to be considered in design. Web designers know they must stay sharp in order to keep up with the rapid pace of technology change. This much-needed...

Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)

As other complex systems in social and natural sciences as well as in engineering, the Internet is hard to understand from a technical point of view. Packet switched networks defy analytical modeling. The Internet is an outstanding and challenging case because of its fast development, unparalleled heterogeneity and the inherent lack of...

A VLSI Architecture for Concurrent Data Structures (The Springer International Series in Engineering and Computer Science)
A VLSI Architecture for Concurrent Data Structures (The Springer International Series in Engineering and Computer Science)
Concurrent data structures simplify the development of concurrent programs by encapsulating commonly used mechanisms for synchronization and commu­ nication into data structures. This thesis develops a notation for describing concurrent data structures, presents examples of concurrent data structures, and describes an architecture to support...
GIMP 2.6 cookbook
GIMP 2.6 cookbook

The GIMP project was started in 1995 by Peter Mattis and Spencer Kimball, and is now maintained by a group of volunteers under the auspices of the GNU Project. The first release was in January 1996, The latest version of GIMP, version 2.6.1, was released on December 21, 2010. Available under the terms of the GNU General Public License, GIMP...

Developing C# Apps for iPhone and iPad using MonoTouch: iOS Apps Development for .NET Developers
Developing C# Apps for iPhone and iPad using MonoTouch: iOS Apps Development for .NET Developers

Developing C# Applications for iPhone and iPad using MonoTouch shows you how to use your existing C# skills to write apps for the iPhone and iPad. Fortunately, there's MonoTouch, Novell's .NET library that allows C# developers to write C# code that executes in iOS. Furthermore, MonoTouch allows you to address all the unique...

Professional Plone 4 Development
Professional Plone 4 Development

I suspect Martin plied me to write this foreword while out one evening during the 2010 Plone Conference in Bristol. Full from an excellent dinner and even better conversation, beer in hand, who could say no?

I've long envied Martin's ability to write. Text and code flow from his fingers at a rate that I can't even begin...

Result Page: Previous 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy