Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Exploring Java 9: Build Modularized Applications in Java
Exploring Java 9: Build Modularized Applications in Java
Discover all the new features and changes in Java 9, including module systems―JPMS or Project Jigsaw. This book covers the whole Java application development life cycle. You'll review all the important concepts, including module descriptor, unnamed module, automatic module, and command line tools. 

Classical Feedback Control: With MATLAB® and Simulink®, Second Edition (Automation and Control Engineering)
Classical Feedback Control: With MATLAB® and Simulink®, Second Edition (Automation and Control Engineering)

This second edition textbook describes the design and implementation of high-performance feedback controllers for engineering systems. It emphasizes the frequency-domain design and methods based on Bode integrals, loop shaping, and nonlinear dynamic compensation. The authors include many problems and offer practical applications,...

OCA Java SE 8 Programmer I Exam Guide (Exams 1Z0-808)
OCA Java SE 8 Programmer I Exam Guide (Exams 1Z0-808)

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Up-to-date coverage of every topic on the Java 8 SE Programmer I exam

Prepare for the OCA Java SE 8...

Modern Compiler Implementation in C
Modern Compiler Implementation in C

This new, expanded textbook describes all phases of a modern compiler: lexical analysis, parsing, abstract syntax, semantic actions, intermediate representations, instruction selection via tree matching, dataflow analysis, graph-coloring register allocation, and runtime systems. It includes good coverage of current techniques in code...

Calculus Demystified : A Self Teaching Guide
Calculus Demystified : A Self Teaching Guide
LEARNING CALCULUS JUST GOT A LOT EASIER!

Here’s an innovative shortcut to gaining a more intuitive understanding of both differential and integral calculus. In Calculus Demystified an experienced teacher and author of more than 30 books puts all the math background you need inside and uses practical examples,...

Microsoft Azure: Enterprise Application Development
Microsoft Azure: Enterprise Application Development

This fast-paced guide enables developers to design and build Enterprise applications for the cloud. You will find it easy to follow this book, as the authors use an actual online portal application for the case study. Throughout the development of the sample application there is discussion of important considerations for moving an application...

Threat Forecasting: Leveraging Big Data for Predictive Analysis
Threat Forecasting: Leveraging Big Data for Predictive Analysis

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop...

Domain-Driven Design: Tackling Complexity in the Heart of Software
Domain-Driven Design: Tackling Complexity in the Heart of Software

The software development community widely acknowledges that domain modeling is central to software design. Through domain modeling, software developers are able to express rich functionality and translate that functionality into software implementation that truly serves the needs of its users. Despite its obvious importance,...

Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis

Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves...

Fuzzy Models and Algorithms for Pattern Recognition and Image Processing
Fuzzy Models and Algorithms for Pattern Recognition and Image Processing

Fuzzy Models and Algorithms for Pattern Recognition and Image Processing presents a comprehensive introduction of the use of fuzzy models in pattern recognition and selected topics in image processing and computer vision. Unique to this volume in the Kluwer Handbooks of Fuzzy Sets Series is the fact that...

Result Page: 65 64 63 62 61 60 59 58 57 56 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy