Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity

Create simple to advanced shell scripts and enhance your system functionality with effective recipes

Key Features

  • Automate tedious and repetitive tasks
  • Create several novel applications ranging from a simple IRC logger to a Web Scraper
  • Manage your system...
Beginning SVG: A Practical Introduction to SVG using Real-World Examples
Beginning SVG: A Practical Introduction to SVG using Real-World Examples

Develop SVG functionality for use within websites quickly and natively, using basic tools such as HTML and CSS. This book is a project-oriented guide to creating and manipulating scalable vector graphics in the browser for websites or online applications, using little more than a text editor or free software, and the power of...

Language, Media and Culture (Routledge Key Guides)
Language, Media and Culture (Routledge Key Guides)

Language, Media and Culture: The Key Concepts is an authoritative and indispensable guide to the essential terminology of the overlapping fields of Language, Media and Culture. Designed to give students and researchers ‘tools for thinking with’ in addressing major issues of communicative change in the 21st...

Quantifying and Processing Biomedical and Behavioral Signals (Smart Innovation, Systems and Technologies)
Quantifying and Processing Biomedical and Behavioral Signals (Smart Innovation, Systems and Technologies)

The book is based on interdisciplinary research on various aspects and dynamics of human multimodal signal exchanges. It discusses realistic application scenarios where human interaction is the focus, in order to

  • identify new methods for data processing and data flow coordination through synchronization, and...
Parallel Programming with Co-arrays (Chapman & Hall/CRC Computational Science)
Parallel Programming with Co-arrays (Chapman & Hall/CRC Computational Science)

Parallel Programming with Co-Arrays describes the basic techniques used to design parallel algorithms for high-performance, scientific computing. It is intended for upper-level undergraduate students and graduate students who need to develop parallel codes with little or no previous introduction to parallel...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Helping Kids with Coding For Dummies
Helping Kids with Coding For Dummies

Help for grown-ups new to coding

Getting a jump on learning how coding makes technology work is essential to prepare kids for the future. Unfortunately, many parents, teachers, and mentors didn't learn the unique logic and language of coding in school. Helping Kids with Coding For Dummies comes to the...

DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies
DevOps: Continuous Delivery, Integration, and Deployment with DevOps: Dive into the core DevOps strategies

Explore the high-in demand core DevOps strategies with powerful DevOps tools such as Ansible, Jenkins, and Chef

Key Features

  • Get acquainted with methodologies and tools of the DevOps framework
  • Perform continuous integration, delivery, deployment, and monitoring using...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Interactions Between Computational Intelligence and Mathematics Part 2 (Studies in Computational Intelligence)
Interactions Between Computational Intelligence and Mathematics Part 2 (Studies in Computational Intelligence)

This book presents recent research in the field of interaction between computational intelligence and mathematics. In the current technological age, we face the challenges of tackling very complex problems – in the usual sense, but also in the mathematical and theoretical computer science sense. However, even the most...

Post-Silicon Validation and Debug
Post-Silicon Validation and Debug

This book provides a comprehensive coverage of System-on-Chip (SoC) post-silicon validation and debug challenges and state-of-the-art solutions with contributions from SoC designers, academic researchers as well as SoC verification experts.  The readers will get a clear understanding of the existing debug infrastructure and how...

Herbicide Residue Research in India (Environmental Chemistry for a Sustainable World, 12)
Herbicide Residue Research in India (Environmental Chemistry for a Sustainable World, 12)

Herbicides constitute about 60% of the total pesticides consumed globally. In India, the use of herbicides started initially in tea gardens and picked up in the 1970s, when the high-yielding varieties of rice and wheat were introduced. Presently, 67 herbicides are registered in the country for controlling weeds in crops including...

unlimited object storage image
Result Page: Previous 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy