Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OS X and iOS Kernel Programming
OS X and iOS Kernel Programming
Kernel development can be a daunting task and is very different from programming traditional user applications. The kernel environment is more volatile and complex. Extraordinary care must be taken to ensure that kernel code is free of bugs because any issue may have serious consequences to the stability, security, and performance...
Traders at Work: How the World's Most Successful Traders Make Their Living in the Markets
Traders at Work: How the World's Most Successful Traders Make Their Living in the Markets

Shortly after most novice traders discover how trading works and begin to realize that they have the potential to make unlimited amounts of money in the financial markets, they start dreaming the near-impossible dream. They fantasize about buying that condo in Boca Raton for their parents or surprising their son with a brand-new car on his...

GNS3 Network Simulation Guide
GNS3 Network Simulation Guide

Acquire a comprehensive knowledge of the GNS3 graphical network simulator, using it to prototype your network without the need for physical routers

Overview

  • Develop your knowledge for Cisco certification (CCNA, CCNP, CCIE), using GNS3
  • Install GNS3 successfully on Windows, Linux, or OS...
Hardening Windows, Second Edition
Hardening Windows, Second Edition

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
Character Development in Blender 2.5
Character Development in Blender 2.5

I got started in Blender approximately eight and a half years ago. At the time, there were very few tutorials or other training resources available. Essentially, the only resource around was the people of the Blender Community, who was active through the online forum, http://blenderartists.org. With nothing but the generous time of...

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

The Renewable Energy Transition: Realities for Canada and the World (Lecture Notes in Energy)
The Renewable Energy Transition: Realities for Canada and the World (Lecture Notes in Energy)

Canada is a well-endowed country that serves as an ideal model to lead the reader through the development of energy, resources, and society historically and into a post-carbon future. The book provides an historical perspective and describes the physical resource limitations, energy budgets, and climate realities that will...

Extending and Modifying LAMMPS Writing Your Own Source Code: A pragmatic guide to extending LAMMPS as per custom simulation requirements
Extending and Modifying LAMMPS Writing Your Own Source Code: A pragmatic guide to extending LAMMPS as per custom simulation requirements

Understand the LAMMPS source code and modify it to meet your research needs, and run simulations for bespoke applications involving forces, thermostats, pair potentials and more with ease

Key Features

  • Understand the structure of the LAMMPS source code
  • Implement custom...
Scratch 1.4: Beginner's Guide
Scratch 1.4: Beginner's Guide

If you have the imaginative power to design complex multimedia projects but can't adapt to programming languages, then Scratch 1.4: Beginner's Guide is the book for you. Imagine how good you'll feel when you drag-and-drop your way to interactive games, stories, graphic artwork, computer animations, and much more using Scratch even...

Complex Variables and the Laplace Transform for Engineers
Complex Variables and the Laplace Transform for Engineers

Widely acclaimed text on essential engineering mathematics. Theory of complex variables, Cauchy-Riemann equations, conformal mapping, multivalued functions, etc. Also Fourier and Laplace Transform theory, its applications to engineering, including integrals, linear integrodifferential equations, Z Transform, much more. Many excellent...

Programming in Visual C# 2008
Programming in Visual C# 2008

Be sharp. Learn C#. Programming in Visual C# 2008 gives you a fresh and easily accessible approach to learning programming concepts using Visual C# for 2008, one of the most pervasive programming languages in the job market today. Best-selling authors Bradley and Millspaugh apply their proven pedagogy, incorporating basic concepts of...

unlimited object storage image
Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy