Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Your UNIX/Linux: The Ultimate Guide

Buy

Your UNIX/Linux: The Ultimate Guide, written with both users and programmers in mind, is the ultimate UNIX/Linux text. Both pedagogical tool and exhaustive reference, it is well-suited to any course that includes UNIX or Linux. A strong pedagogical framework sets it apart from similar texts and allows beginning students to gain a firm grasp of fundamental concepts, while chapters on advanced topics inspire the more experienced reader to move beyond the basics. Nearly a thousand exercises and self-test questions provide a way for students to test and reinforce their understanding of the material.

(HTML tags aren't allowed.)

Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.>

  • Comprehensive coverage and practical examples of the industry...

OCA/OCP: Oracle9i DBA Fundamentals I Study Guide
OCA/OCP: Oracle9i DBA Fundamentals I Study Guide
Here's the book you need to prepare for Exam 1Z0-031: OCA/OCP: Oracle9i DBA Fundamentals I Study Guide
  • In-depth coverage of official exam objectives
  • Practical information on implementing and managing Oracle9i databases
  • Hundreds of challenging review questions, in the book and on...
SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach (Recipes: a Problem-Solution Approach)
SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach (Recipes: a Problem-Solution Approach)
SQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language that is at the core of SQL Server 2008. Learn to create databases, insert and update data, generate reports, secure your data, and more. Author Joseph Sack takes common...

Patent Law for Computer Scientists: Steps to Protect Computer-Implemented Inventions
Patent Law for Computer Scientists: Steps to Protect Computer-Implemented Inventions

Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirements should be satisfied if an invention is to be granted a patent. This is particularly true for inventions implemented on a computer. While roughly a third of all applications (and granted patents) relate, in one way or another,...

Introduction to Algorithms, Third Edition
Introduction to Algorithms, Third Edition

Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms uniquely combines rigor and comprehensiveness. The book covers a broad range of algorithms in depth, yet makes their design and analysis accessible to all levels of readers. Each chapter is relatively...

Probabilistic Graphical Models: Principles and Techniques (Adaptive Computation and Machine Learning series)
Probabilistic Graphical Models: Principles and Techniques (Adaptive Computation and Machine Learning series)

Most tasks require a person or an automated system to reason--to reach conclusions based on available information. The framework of probabilistic graphical models, presented in this book, provides a general approach for this task. The approach is model-based, allowing interpretable models to be constructed and then manipulated by reasoning...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy