Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Redmine - Second Edition
Mastering Redmine - Second Edition

Key Features

  • Learn Redmine through the basic topics to the mastering ones
  • Customize Redmine without breaking upgrade compatibility
  • Become an expert of Redmine after having read this comprehensive guide with tips, tricks and best practices.

Book Description

...

T-SQL Fundamentals (3rd Edition)
T-SQL Fundamentals (3rd Edition)

Effectively query and modify data using Transact-SQL
Master T-SQL fundamentals and write robust code for Microsoft SQL Server and Azure SQL Database. Itzik Ben-Gan explains key T-SQL concepts and helps you apply your knowledge with hands-on exercises. The book first introduces
...

Introducing Go: Build Reliable, Scalable Programs
Introducing Go: Build Reliable, Scalable Programs

Perfect for beginners familiar with programming basics, this hands-on guide provides an easy introduction to Go, the general-purpose programming language from Google. Author Caleb Doxsey covers the language’s core features with step-by-step instructions and exercises in each chapter to help you practice what you learn.

...
OpenStack in Action
OpenStack in Action

Summary

OpenStack in Action offers the real world use cases and step-by-step instructions you can take to develop your own cloud platform from from inception to deployment. This book guides you through the design of both the physical hardware cluster and the infrastructure services you'll need to create a...

Mastering Yii
Mastering Yii

Key Features

  • Learn to work with the key aspects of Yii Framework 2
  • Explore how to create RESTful APIs with Yii
  • Incorporate codeception with Yii2 to test your code thoroughly

Book Description

The successor of Yii Framework 1.1, Yii2 is a complete rewrite of Yii...

Practical Digital Forensics
Practical Digital Forensics

Get started with the art and science of digital forensics with this practical, hands-on guide!

About This Book

  • Champion the skills of digital forensics by understanding the nature of recovering and preserving digital information which is essential for legal or disciplinary proceedings
  • ...
Yocto for Raspberry Pi
Yocto for Raspberry Pi

Create unique and amazing projects by using the powerful combination of Yocto and Raspberry Pi

About This Book

  • Set up and configure the Yocto Project efficiently with Raspberry Pi
  • Deploy multimedia applications from existing Yocto/OE layers
  • An easy-to-follow guide to...
iOS 9 Swift Programming Cookbook: Solutions and Examples for iOS Apps
iOS 9 Swift Programming Cookbook: Solutions and Examples for iOS Apps

All of the example code for this book has been updated on the author's GitHub repository (September 2016).

Ready to build stunning apps for iPhone, iPad, and Apple Watch? This cookbook—completely rewritten with all-new material—provides 90 proven solutions for tackling the latest features in iOS 9...

Algorithms in a Nutshell: A Practical Guide
Algorithms in a Nutshell: A Practical Guide

Creating robust software requires the use of efficient algorithms, but programmers seldom think about them until a problem occurs. This updated edition of Algorithms in a Nutshell describes a large number of existing algorithms for solving a variety of problems, and helps you select and implement the right algorithm for your...

ARM® Cortex® M4 Cookbook
ARM® Cortex® M4 Cookbook

About This Book

  • This book focuses on programming embedded systems using a practical approach
  • Examples show how to use bitmapped graphics and manipulate digital audio to produce amazing games and other multimedia applications
  • The recipes in this book are written using ARM's MDK...
Learning Proxmox VE
Learning Proxmox VE

Unleash the power of Proxmox VE by setting up a dedicated virtual environment to serve both containers and virtual machines

About This Book

  • Create virtual machines and containers from the comfort of your workstation using Proxmox VE's web-based management...
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Advanced Penetration Testing for Highly-Secured Environments - Second Edition

Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments

About This Book

  • Learn how to build your own pentesting lab environment to practice advanced techniques
  • Customize your own scripts, and learn methods to exploit 32-bit and 64-bit...
Result Page: Previous 33 34 35 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy