Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Clojure Data Structures and Algorithms Cookbook
Clojure Data Structures and Algorithms Cookbook

25 recipes to deeply understand and implement advanced algorithms in Clojure

About This Book

  • Explore various advanced algorithms and learn how they are used to address many real-world computing challenges
  • Construct elegant solutions using impressive techniques including zippers, parsing,...
Mac Application Development For Dummies
Mac Application Development For Dummies

The App Store extends to the Mac desktop! Developers: here's how join the fun

If you love your desktop Mac and want to enjoy the fun and challenge of developing Mac apps for the App Store, here's your chance to get started. This fun, full-color guide shows you how to create killer Mac apps on, and for, a desktop Mac....

Mobile Business Strategies: Understanding the Technologies and Opportunities (Wireless Press)
Mobile Business Strategies: Understanding the Technologies and Opportunities (Wireless Press)
Mobile phones are no longer just a means of calling another person. In several countries, mobile devices are used to pay for merchandise, receive time sensitive information and send e-mail messages. Additionally, corporations use mobile phones to access critical business information and send tasks to field workers, regardless of time or...
Cyber Situational Awareness: Issues and Research (Advances in Information Security)
Cyber Situational Awareness: Issues and Research (Advances in Information Security)

Today, when a security accident occurs, the top three questions security administrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the first two questions form the "core" of Cyber Situational Awareness. In addition, whether the last question can be well answered, is greatly dependent...

The Business of iPhone App Development: Making and Marketing Apps that Succeed
The Business of iPhone App Development: Making and Marketing Apps that Succeed

The phenomenal success of the iPhone and the iPod touch has ushered in a “gold rush” for developers, but with well over 100,000 apps in the highly competitive App Store, it has become increasingly difficult for new apps to stand out in the crowd. Achieving consumer awareness and sales longevity for your iPhone app requires a lot...

Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

Beginning Relational Data Modeling, Second Edition
Beginning Relational Data Modeling, Second Edition

Data storage design, and awareness of how data needs to be utilized within an organization, is of prime importance in ensuring that company data systems work efficiently. If you need to know how to capture the information needs of a business system in a relational database model, but don’t know where to start, then this is the book for...

Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
Investigator's Guide to Steganography
Investigator's Guide to Steganography

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable...

Abdominal Ultrasound: How, Why and When
Abdominal Ultrasound: How, Why and When
Ultrasound continues to be one of the most important diagnostic tools at our disposal. It is used by a wide range of healthcare professionals across many applications. This book is intended as a practical, easily accessible guide to sonographers and those learning and developing in the field of abdominal ultrasound. The most obvious drawbacks of...
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

Clout: The Art and Science of Influential Web Content (Voices That Matter)
Clout: The Art and Science of Influential Web Content (Voices That Matter)

The web is all about action verbs. We click. We search. We navigate. We make choices. Alone among other forms of media, we’re the ones who control our experience.

When organizations try to connect with their customers online, one of the first things they always want to know is “how can we get our users to do...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy