Streamango | Lien 12: Add: Depuis 18 heure Téléchargement | Review: Substitute Boyfriend by Jade C Jamison
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Discipline of Organizing: Professional Edition, 3rd Edition
The Discipline of Organizing: Professional Edition, 3rd Edition

This ebook exploits many advanced capabilities with images, hypertext, and interactivity and is optimized for EPUB3-compliant book readers, especially Apple's iBooks and browser plugins. These features may not work on all ebook readers.

...
Cybersonic Arts: Adventures in American New Music (Music in American Life)
Cybersonic Arts: Adventures in American New Music (Music in American Life)
Composer, performer, instrument builder, teacher, and writer Gordon Mumma has left an indelible mark on the American contemporary music scene. A prolific composer and innovative French horn player, Mumma is recognized for integrating advanced electronic processes into musical structures, an approach he has termed "Cybersonics."...
Mastering Linux Shell Scripting
Mastering Linux Shell Scripting

Key Features

  • Identify the high level steps such as verifying user input, using command lines and conditional statements in creating and executing simple shell scripts
  • Create and edit dynamic shell scripts to manage complex and repetitive tasks
  • Learn about scripting in Perl and programming in...
Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Creating Mobile Apps with jQuery Mobile - Second Edition
Creating Mobile Apps with jQuery Mobile - Second Edition

Create fully responsive and versatile real-world apps for smartphones with jQuery Mobile 1.4.5

About This Book

  • Learn how to integrate advanced features such as Geolocation, HTML 5 Video, and the Web Audio API into your web application
  • Enhance your efficiency by automating repetitive tasks...
M Is for (Data) Monkey: A Guide to the M Language in Excel Power Query
M Is for (Data) Monkey: A Guide to the M Language in Excel Power Query
Power Query is one component of the Power BI (Business Intelligence) product from Microsoft, and “M” is the name of the programming language created by it. As more business intelligence pros begin using Power Pivot, they find that they do not have the Excel skills to clean the data in Excel; Power Query solves this problem. This book...
Neo4j Graph Data Modeling
Neo4j Graph Data Modeling

Design efficient and flexible databases by optimizing the power of Neo4j

About This Book

  • Model your data as a graph using Neo4j to design databases with minimum hassle
  • Discover new patterns using graphs and solve problems that are difficult to solve using any other database
  • ...
Learning Selenium Testing Tools - Third Edition
Learning Selenium Testing Tools - Third Edition

Leverage the power of Selenium to build your own real-time test cases from scratch

About This Book

  • Build automated scripts and develop Test Automation Frameworks using the Selenium WebDriver tool
  • Automate tests to ensure error free, quality software
  • A comprehensive guide...
Hadoop: The Definitive Guide
Hadoop: The Definitive Guide

Get ready to unlock the power of your data. With the fourth edition of this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. This book is ideal for programmers looking to analyze datasets of any size, and for administrators who want to set up and run Hadoop...

Infosec Management Fundamentals
Infosec Management Fundamentals

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the...

Agile Software Development with HP Agile Manager
Agile Software Development with HP Agile Manager

Agile development practices have been widely adopted in a variety of organizations, yet only a few tools are available to help make the practical process of managing agile teams less painful and more successful.

HP Agile Manager is a purpose-built SaaS-based Agile planning tool. HP Agile Manager provides a simpler, smarter way to...

Result Page: Previous 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy