The Handmaid's Tale : la servante carlate S02E09 FRENCH HDTV | 4 K linuxmint-18 3-cinnamon-64bit iso | Season 2 Episode 1 And the Hidden Stash
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black
Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black

This comprehensive book provides detailed materials for both novice and experienced programmers using all BeagleBone variants which host a powerful 32-bit, super-scalar TI Sitara ARM Cortex A8 processor. Authored by Steven F. Barrett and Jason Kridner, a seasoned ECE educator along with the founder of Beagleboard.org, respectively, the work...

Docker Bootcamp
Docker Bootcamp

Fast, intensive, and effective Docker learning

About This Book

  • Get well-versed with Docker in 7 days
  • Identify and resolve common problems faced by users while working with Docker
  • A fast-paced guide that will focus on all the core Docker functionalities

...

CentOS 6 Linux Server Cookbook
CentOS 6 Linux Server Cookbook

An all-in-one guide to installing, configuring, and running a Centos 6 server. Ideal for newbies and old-hands alike, this practical tutorial ensures you get the best from this popular, enterprise-class free server solution.

  • Delivering comprehensive insight into CentOS server with a series of starting points that show you...
Using Docker: Developing and Deploying Software with Containers
Using Docker: Developing and Deploying Software with Containers

Docker containers offer simpler, faster, and more robust methods for developing, distributing, and running software than previously available. With this hands-on guide, you’ll learn why containers are so important, what you’ll gain by adopting Docker, and how to make it part of your development...

Network Security Through Data Analysis: From Data to Action
Network Security Through Data Analysis: From Data to Action

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll...

Build Supercomputers with Raspberry Pi 3
Build Supercomputers with Raspberry Pi 3

Key Features

  • Carlos R. Morrison from NASA will teach you to build a supercomputer with Raspberry Pi 3
  • Deepen your understanding of setting up host nodes, configuring networks, and automating mountable drives
  • Learn various math, physics, and engineering applications to solve complex...
Computer Sciences: Macmillan Science Library
Computer Sciences: Macmillan Science Library
The science of computing has come a long way since the late 1930s, when John Vincent Atanasoff and Clifford Berry began work on the first electronic digital computer. One marvels to see how the science has advanced from the days of Charles Babbage, who developed the Difference Engine in the 1820s, and, later proposed the...
Pro Continuous Delivery: With Jenkins 2.0
Pro Continuous Delivery: With Jenkins 2.0
Follow this step-by-step guide for creating a continuous delivery pipeline using all of the new features in Jenkins 2.0 such as Pipeline as a Code, multi-branch pipeline, and more. You will learn three crucial elements for achieving a faster software delivery pipeline: a fungible build/test environment, manageable and reproducible...
File System Forensic Analysis
File System Forensic Analysis
The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier...
Citrix Access Gateway VPX 5.04 Essentials
Citrix Access Gateway VPX 5.04 Essentials

A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX

Overview

  • A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
  • Establish secure access...
Prime Numbers: The Most Mysterious Figures in Math
Prime Numbers: The Most Mysterious Figures in Math

A fascinating journey into the mind-bending world of prime numbers

Cicadas of the genus Magicicada appear once every 7, 13, or 17 years. Is it just a coincidence that these are all prime numbers? How do twin primes differ from cousin primes, and what on earth (or in the mind of a mathematician) could be sexy about prime numbers?
...

Learning TypeScript
Learning TypeScript

Exploit the features of TypeScript to develop and maintain captivating web applications with ease

About This Book

  • Learn how to develop modular, scalable, maintainable, and adaptable web applications by taking advantage of TypeScript
  • Create object-oriented JavaScript that adheres to the...
Result Page: 57 56 55 54 53 52 51 50 49 48 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy