Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)

For use with all versions of Linux, including Ubuntu,™ Fedora,™ openSUSE,™ Red Hat,® Debian, Mandriva, Mint, and now OS X, too!

  • Get more done faster, and become a true Linux guru by mastering the command line!
  • ...
Professional Flash Lite Mobile Development (Wrox Programmer to Programmer)
Professional Flash Lite Mobile Development (Wrox Programmer to Programmer)

Discover how to create Flash Lite mobile apps from the ground up

Adobe Flash is an ideal choice for developing rich interactive content for "Flash-enabled" mobile devices; and with this book, you'll learn how to create unique applications with Flash Lite. Through a series of code samples and extensive example...

Fighting Computer Crime: A New Framework for Protecting Information
Fighting Computer Crime: A New Framework for Protecting Information

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during...

C# 2010 All-in-One For Dummies
C# 2010 All-in-One For Dummies

A logical, straightforward approach to learning the C# language

C# is a complicated programming language for building .NET-connected software for Microsoft Windows, the Web, and a wide range of devices. The friendly All-in-One For Dummies format is a perfect way to present it. Each minibook is a self-contained package...

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

Programming Windows Identity Foundation (Dev - Pro)
Programming Windows Identity Foundation (Dev - Pro)

A few years ago, I was sitting at a table playing a game of poker with a few colleagues from Microsoft who had all been involved at various times in the development of Web Services Enhancements for Microsoft .NET (WSE). Don Box, Mark Fussell, Kirill Gavrylyuk, and I played the hands while showman extraordinaire Doug Purdy engaged us with...

REST in Practice: Hypermedia and Systems Architecture
REST in Practice: Hypermedia and Systems Architecture

Why don't typical enterprise projects go as smoothly as projects you develop for the Web? Does the REST architectural style really present a viable alternative for building distributed systems and enterprise-class applications?

In this insightful book, three SOA experts provide a down-to-earth explanation of REST and...

Modeling and Tools for Network Simulation
Modeling and Tools for Network Simulation

A crucial step during the design and engineering of communication systems is the estimation of their performance and behavior; especially for mathematically complex or highly dynamic systems network simulation is particularly useful. This book focuses on tools, modeling principles and state-of-the art models for discrete-event based network...

Worst-Case Execution Time Aware Compilation Techniques for Real-Time Systems (Embedded Systems)
Worst-Case Execution Time Aware Compilation Techniques for Real-Time Systems (Embedded Systems)

For real-time systems, the worst-case execution time (WCET) is the key objective to be considered. Traditionally, code for real-time systems is generated without taking this objective into account and the WCET is computed only after code generation. Worst-Case Execution Time Aware Compilation Techniques for Real-Time Systems presents...

Becoming a Tiger: How Baby Animals Learn to Live in the Wild
Becoming a Tiger: How Baby Animals Learn to Live in the Wild

It's a jungle out there. And survival is never a given. Somehow, a blind, defenseless tiger kitten must evolve into a deadly, efficient predator; a chimp must learn to distinguish edible plants from lethal poisons; a baby buffalo must be able to pick its mother out of a herd of hundreds. Contrary to common belief, not everything is...

Standard for VHDL Register Transfer Level (Rtl) Synthesis
Standard for VHDL Register Transfer Level (Rtl) Synthesis

[This introduction is not part of IEEE Std 1076.6-1999, IEEE Standard for VHDL Register Transfer Level (RTL) Synthesis.]

This standard describes a syntax and semantics for VHDL RTL synthesis. It defines the subset of IEEE Std 1076-1993 (VHDL) that is suitable for RTL synthesis as well as the semantics of that subset for the...

Developer's Guide to Social Programming
Developer's Guide to Social Programming

In The Developer’s Guide to Social Programming, Mark Hawker shows developers how to build applications that integrate with the major social networking sites. Unlike competitive books that focus on a single social media platform, this book covers all three leading platforms: Facebook, OpenSocial, and Twitter....

Result Page: 815 814 813 812 811 810 809 808 807 806 805 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy