Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Linux Debugging and Performance Tuning : Tips and Techniques
Linux Debugging and Performance Tuning : Tips and Techniques

This is the definitive guide to Linux software debugging and performance optimization at both the kernel and application levels. Using extensive Linux code examples, Steve Best systematically introduces open source tools and best-practice techniques for delivering bug-free, well-tuned code.

Drawing on...

Curves and Surfaces for Computer Graphics
Curves and Surfaces for Computer Graphics

Images are all around us. We see them in color and in high resolution. In fact, the natural images we see with our eyes seem perfectly smooth, with no jagged edges and no graininess. Computer graphics, on the other hand, deals with images that consist of small dots, pixels. When we first hear of this feature of computer graphics, we...

CCIE Self-Study: CCIE Security Exam Certification Guide, Second Edition
CCIE Self-Study: CCIE Security Exam Certification Guide, Second Edition
The Cisco authorized self-study test preparation guide for CCIE Security 2.0 350-018 written exam The only official, Cisco endorsed study guide for the CCIE Security 2.0 written exam Includes best-of-breed self-assessment series features, including a CD-ROM test engine, "Do I Know This Already?" quizzes, topic lists/foundation...
Agile Estimating and Planning (Robert C. Martin Series)
Agile Estimating and Planning (Robert C. Martin Series)
This book could have been called Estimating and Planning Agile Projects. Instead, it's called Agile Estimating and Planning. The difference may appear subtle, but it's not. The title makes it clear that the estimating and planning processes must themselves be agile. Without agile estimating and planning, we cannot have agile projects....
Fuzzy Models and Algorithms for Pattern Recognition and Image Processing
Fuzzy Models and Algorithms for Pattern Recognition and Image Processing
Fuzzy Models and Algorithms for Pattern Recognition and Image Processing presents a comprehensive introduction of the use of fuzzy models in pattern recognition and selected topics in image processing and computer vision. Unique to this volume in the Kluwer Handbooks of Fuzzy Sets Series is the fact that this book...
MySQL Crash Course (Sams Teach Yourself in 10 Minutes)
MySQL Crash Course (Sams Teach Yourself in 10 Minutes)

If you are a MySQL user who wants to find out more about the program, but is not interested in becoming a database administrator just to be able to read books on MySQL, then MySQL Crash Course is for you. This tutorial-based book is organized into a series of short, easy-to-follow lessons...

Elementary Functions: Algorithms and Implementation
Elementary Functions: Algorithms and Implementation
"An important topic, which is on the boundary between numerical analysis and computer science…. I found the book well written and containing much interesting material, most of the time disseminated in specialized papers published in specialized journals difficult to find. Moreover, there are very few books on these topics and they are...
Business Calculus Demystified
Business Calculus Demystified

Take the FEAR OUT of Business Calculus

Business Calculus Demystified clarifies the concepts and processes of calculus and demonstrates their applications to the workplace. Best-selling math author Rhonda Huettenmueller uses the same combination of winning step-by-step teaching techniques and real-world business and...

Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
    Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic...
Managing the Risks of IT Outsourcing (Computer Weekly Professional)
Managing the Risks of IT Outsourcing (Computer Weekly Professional)
Buyers or suppliers of IT outsourcing services are constantly tormented
by the prospect of having to deal with the vicissitudes of
risks in their projects. In today’s business environment, the
precipitous rates of technological change have outpaced the ability
of many organizations to support the IT function. These
...
The Mac OS X Command Line: Unix Under the Hood
The Mac OS X Command Line: Unix Under the Hood
Work More Quickly and Easily—and Learn Some New Tricks

The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major
...
The Linux® Kernel Primer: A Top-Down Approach for x86 and PowerPC Architectures
The Linux® Kernel Primer: A Top-Down Approach for x86 and PowerPC Architectures

The Linux® Kernel Primer is the definitive guide to Linux kernel programming. The authors' unique top-down approach makes kernel programming easier to understand by systematically tracing functionality from user space into the kernel and carefully associating kernel internals with...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy