Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Core Python Applications Programming (3rd Edition) (Core Series)
Core Python Applications Programming (3rd Edition) (Core Series)
We are delighted that you have engaged us to help you learn Python as quickly and as deeply as possible. The goal of the Core Python series of books is not to just teach developers the Python language; we want you you to develop enough of a personal knowledge base to be able to develop software in any application area. ...
Introduction to Programming Using Python
Introduction to Programming Using Python

Introduction to Programming Using Python  is intended for use in the introduction to programming course.

 

Daniel Liang is known for his “fundamentals-first” approach to teaching programming concepts and techniques....

Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
The Essential Guide to Telecommunications (5th Edition) (Essential Guides (Prentice Hall))
The Essential Guide to Telecommunications (5th Edition) (Essential Guides (Prentice Hall))

A Completely Revised Bestseller with an Updated Industry Overview and New Coverage of Mobile Networks, LTE, Spectrum, Cloud Computing, and More!

 

The #1 Telecom Guide for Businesspeople and Nontechnical Professionals, Fully Updated for Cloud...

C++ How to Program (8th Edition)
C++ How to Program (8th Edition)

Welcome to the C++ computer programming language and C++ How to Program, Eighth Edition! This book presents leading-edge computing technologies, and is particularly appropriate for inroductory course sequences based on the curriculum recommendations of two key professional organizations—the ACM and the IEEE.

The new...

Business in Action (6th Edition)
Business in Action (6th Edition)

An introduction to business text can be complete without being complex and overwhelming–and this text proves it!

Business in Action is uniquely positioned to help today’s readers become tomorrow’s focused, highly productive business professionals. It is the only introduction to business...

Business Communication Essentials (6th Edition)
Business Communication Essentials (6th Edition)

Directed primarily toward undergraduate business college/university majors, this text also provides practical content to current and aspiring industry professionals.


Only Bovée/Thill texts thoroughly address the new-media skills that employees are expected to have in
...

The Art of the Data Center: A Look Inside the World's Most Innovative and Compelling Computing Environments
The Art of the Data Center: A Look Inside the World's Most Innovative and Compelling Computing Environments

Today, data centers are the beating hearts of the companies they serve. Data centers process billions of Internet transactions every day. It's therefore critical for companies and IT organizations to understand the state-of-the-art in data center design. Narrow aspects - such as cooling, wiring, or power usage - are often the subject of...

Core Java, Volume II--Advanced Features (9th Edition) (Core Series)
Core Java, Volume II--Advanced Features (9th Edition) (Core Series)

Fully updated to reflect Java SE 7 language changes, Core Java®, Volume II—Advanced Features, Ninth Edition, is the definitive guide to Java’s most powerful features for enterprise and desktop application development.

 

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Introduction to Design Patterns in C++ with Qt (2nd Edition)
Introduction to Design Patterns in C++ with Qt (2nd Edition)

I still remember how I first got to know C++ and Qt. It was around 15 years ago while working on my diploma thesis. Most of the development we did at that time was done in Fortran and C. I was working on a Linux system with FVWM as a window manager. One day I read an article about KDE—a cool, new open source project...

Administering VMware Site Recovery Manager 5.0 (VMware Press Technology)
Administering VMware Site Recovery Manager 5.0 (VMware Press Technology)

The Complete, Hands-On Guide to Installing and Configuring VMware Site Recovery Manager 5.0

 

Administering VMware Site Recovery Manager 5.0 is the complete, technical, hands-on guide to VMware Site Recovery Manager (SRM) 5.0...

Result Page: 59 58 57 56 55 54 53 52 51 50 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy