Home | Amazing | Today | Tags | Publishers | Years | Search 
Git Pocket Guide
Git Pocket Guide

This pocket guide is the perfect on-the-job companion to Git, the distributed version control system. It provides a compact, readable introduction to Git for new users, as well as a reference to common commands and procedures for those of you with Git experience.

Written for Git version 1.8.2, this handy task-oriented...

Microsoft Access 2013 Inside Out
Microsoft Access 2013 Inside Out

Conquer Microsoft Access 2013—from the inside out!

You’re beyond the basics, so dive right into Access 2013—and use your skills to create sophisticated database apps! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds. It’s all...

Pro SharePoint 2013 Business Intelligence Solutions
Pro SharePoint 2013 Business Intelligence Solutions

To get ahead in today's hyper-competitive marketplace, your business has to take advantage of the data you already have and mine that data to give you new insight, metrics, and clues to what drives successful customer interactions.  In Pro SharePoint 2013 Business Intelligence Solutions, you'll learn exactly how to...

Transformation Electromagnetics and Metamaterials: Fundamental Principles and Applications
Transformation Electromagnetics and Metamaterials: Fundamental Principles and Applications

Transformation electromagnetics is a systematic design technique for optical and electromagnetic devices that enables novel wave-material interaction properties. The associated metamaterials technology for designing and realizing optical and electromagnetic devices can control the behavior of light and electromagnetic waves in ways that have...

Deep Sequencing Data Analysis (Methods in Molecular Biology)
Deep Sequencing Data Analysis (Methods in Molecular Biology)

The new genetic revolution is fuelled by Deep Sequencing (or Next Generation Sequencing) apparatuses which, in essence, read billions of nucleotides per reaction. Effectively, when carefully planned, any experimental question which can be translated into reading nucleic acids can be applied.In Deep Sequencing Data...

C++ Quick Syntax Reference
C++ Quick Syntax Reference

The C++ Quick Syntax Reference is a condensed code and syntax reference to the C++ programming language. It presents the essential C++ syntax in a well-organized format that can be used as a handy reference.

You won’t find any technical jargon, bloated samples, drawn out history lessons, or witty stories in this book. What...

Evolution and the Future (Beyond Humanism: Trans- and Posthumanism / Jenseits des Humanismus: Trans- und Posthumanismus)
Evolution and the Future (Beyond Humanism: Trans- and Posthumanism / Jenseits des Humanismus: Trans- und Posthumanismus)

Leading scholars from various disciplines analyze the relevance of evolutionary theory for future developments, whereby the fields of anthropology, ethics, and theology are considered in particular detail. The main parts of the collection are dedicated to the following three questions: What are the basic principles of evolutionary processes?...

Implications of Pyrite Oxidation for Engineering Works
Implications of Pyrite Oxidation for Engineering Works

The book highlights and analyses the distress to buildings caused by sulphate-induced heave, with particular reference to the recent problems in the Dublin area of Ireland. It describes the formation of pyrite, the processes involved in its oxidation and the various ways in which consequential expansion takes place. For the first time in the...

Transactions on Petri Nets and Other Models of Concurrency VIII (Lecture Notes in Computer Science)
Transactions on Petri Nets and Other Models of Concurrency VIII (Lecture Notes in Computer Science)

The 8th volume of ToPNoC contains revised and extended versions of a selection of the best workshop papers presented at the 33rd International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (Petri Nets 2012). The 10 papers cover a diverse range of topics including model checking and system verification,...

Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

Optimizing and Troubleshooting Hyper-V Networking
Optimizing and Troubleshooting Hyper-V Networking

This scenario-focused title provides concise technical guidance and insights for troubleshooting and optimizing networking with Hyper-V. Written by experienced virtualization professionals, this little book packs a lot of value into a few pages, offering a lean read with lots of real-world insights and best practices for Hyper-V...

Optimizing and Troubleshooting Hyper-V Storage
Optimizing and Troubleshooting Hyper-V Storage

This scenario-focused title provides concise technical guidance and insights for troubleshooting and optimizing storage with Hyper-V. Written by experienced virtualization professionals, this little book packs a lot of value into a few pages, offering a lean read with lots of real-world insights and best practices for Hyper-V storage...

Result Page: Previous 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy