Shelly Stoyanova | 運命の大命令 | Painkiller Hell And Damnation
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building a BeagleBone Black Super Cluster
Building a BeagleBone Black Super Cluster

Build and configure your own parallel computing Beowulf cluster using BeagleBone Black ARM systems

About This Book

  • Configure your own cluster for high speed parallel computing
  • Benefit from your personally configured super computer which is a power efficient, low-cost, and highly scalable...
CompTIA Linux+ Guide to Linux Certification (MindTap Course List)
CompTIA Linux+ Guide to Linux Certification (MindTap Course List)

Equip yourself with the most up-to-date information to pass CompTIA's Linux+ (Powered by LPI) Certification exam successfully and excel when using Linux in today's business world with Eckert's LINUX+ GUIDE TO LINUX CERTIFICATION, 4E. This complete guide provides the solid conceptual foundation and mastery of hands-on skills...

CentOS System Administration Essentials
CentOS System Administration Essentials

Become an efficient CentOS administrator by acquiring real-world knowledge of system setup and configuration

About This Book

  • Centralize user accounts in openLDAP and understand how Directory can be at the back-end of many services
  • Learning Puppet to centralize server configuration will...
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

Advanced Linux Networking
Advanced Linux Networking

With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful...

Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
Introduction to RF Propagation
Introduction to RF Propagation
An introduction to RF propagation that spans all wireless applications

This book provides readers with a solid understanding of the concepts involved in the propagation of electromagnetic waves and of the commonly used modeling techniques. While many books cover RF propagation, most are geared to cellular telephone systems and, therefore, are...

Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd...

Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering
Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering
Here we have a comprehensive, problem-oriented, engineering perspective on the uses of neural nets, fuzzy systems, and hybrids that emphasizes practical solutions to everyday artificial intelligence (AI) problems over abstract theoretical noodling. Intended for upper-division students and postgraduates who need a...
Practical Guide to Ubuntu Linux, A (3rd Edition)
Practical Guide to Ubuntu Linux, A (3rd Edition)

The Most Complete, Easy-to-Follow Guide to Ubuntu Linux

  • The #1 Ubuntu server resource, fully updated for Ubuntu 10.4 (Lucid Lynx)–the Long Term Support (LTS) release many companies will rely on for years!
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Result Page: 14 13 12 11 10 9 8 7 6 5 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy