Nu saison 1 Episode 1 Streaming VF | Philip Hersh | Jessica Schembri High End Retouching Educational Video Descargar
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Playground: Geeky Projects for the Curious Programmer
Python Playground: Geeky Projects for the Curious Programmer

Python is a powerful programming language that’s easy to learn and fun to play with. But once you’ve gotten a handle on the basics, what do you do next?

Python Playground is a collection of imaginative programming projects that will inspire you to use Python to make art and music, build simulations of
...

The Book of R: A First Course in Programming and Statistics
The Book of R: A First Course in Programming and Statistics

The Book of R is a comprehensive, beginner-friendly guide to R, the world’s most popular programming language for statistical analysis. Even if you have no programming experience and little more than a grounding in the basics of mathematics, you’ll find everything you need to begin using R effectively for statistical...

Super Scratch Programming Adventure! (Covers Version 2): Learn to Program by Making Cool Games (Covers Version 2)
Super Scratch Programming Adventure! (Covers Version 2): Learn to Program by Making Cool Games (Covers Version 2)

Scratch is the wildly popular educational programming language used by millions of first-time learners in classrooms and homes worldwide. By dragging together colorful blocks of code, kids can learn computer programming concepts and make cool games and animations. The latest version, Scratch 2, brings the language right into your web browser,...

The Linux Command Line: A Complete Introduction
The Linux Command Line: A Complete Introduction

You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line.

The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way...

Art of RAW Conversion: How to Produce Art-Quality Photos with Adobe Photoshop CS2 and Leading RAW Converters
Art of RAW Conversion: How to Produce Art-Quality Photos with Adobe Photoshop CS2 and Leading RAW Converters
The RAW file format used by digital cameras is essentially the raw data that a camera captures when it takes a photo. RAW files allow the digital photographer to edit and manipulate their photos with less data loss than in other file formats (such as JPEG). There are many RAW conversion tools, and it's often a good idea to use more than one to get...
The Linux Programming Interface: A Linux and UNIX System Programming Handbook
The Linux Programming Interface: A Linux and UNIX System Programming Handbook

The Linux Programming Interface is the definitive guide to the Linux and UNIX programming interface—the interface employed by nearly every application that runs on a Linux or UNIX system.

In this authoritative work, Linux programming expert Michael Kerrisk provides detailed descriptions of the system calls...

The Art of Assembly Language
The Art of Assembly Language

Assembly is a low-level programming language that's one step above a computer's native machine language. Although assembly language is commonly used for writing device drivers, emulators, and video games, many programmers find its somewhat unfriendly syntax intimidating to learn and use.

Since 1996, Randall Hyde's...

The Debian System: Concepts and Techniques
The Debian System: Concepts and Techniques
The Debian GNU/Linux operating system approaches Linux system administration differently than other popular Linux distributions, favoring text-based configuration mechanisms over graphical user interfaces (GUIs). Debian may appear simplistic and even slightly outdated, but it is actually very robust, scalable, and secure. Debian's open development...
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Absolute BSD: The Ultimate Guide to FreeBSD
Absolute BSD: The Ultimate Guide to FreeBSD
    Welcome to Absolute BSD! This book is a one-stop shop for new UNIX administrators who want to build, configure, and manage dedicated FreeBSD servers. It will also be useful for those folks who want to run FreeBSD on their desktop or combined desktop/server systems.
    By the time you finish this book, you
...
Growing Software: Proven Strategies for Managing Software Engineers
Growing Software: Proven Strategies for Managing Software Engineers

As the technology leader at a small software company, you need to focus on people, products, processes, and technology as you bring your software to market, while doing your best to put out fires and minimize headaches.

Growing Software is your guide to juggling the day-to-day challenges of running a software company while...

Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...

Result Page: 13 12 11 10 9 8 7 6 5 4 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy