 |
|
|
|
 Lex & Yacc (A Nutshell Handbook)
This book shows you how to use two Unix utilities, lex and yacc, in program development. These tools help programmers build compilers and interpreters, but they also have a wider range of applications. The second edition contains completely revised tutorial sections for novice users and reference sections for advanced users.... |  |  Core Web Programming, Second EditionOne-stop shopping for serious Web developers!
The authoritative guide to every technology that enterprise Web developers need to master, from HTML 4 to Java 2 Standard Edition 1.3, servlets to JavaServer Pages, and beyond. Core Web Programming,... |  |  Teach Yourself Unix in 24 HoursSams Teach Yourself UNIX in 24 Hours, Second Edition is designed to take users from novice to accomplished user in just 24 one-hour sessions. Written by experts in the field, Sams Teach Yourself UNIX in 24 Hours, Second Edition starts off with an introduction to UNIX, then covers file handling, pipes and filters, the vi and EMACS text editors,... |
|
 Network Programming with PerlNetwork Programming with Perl is a comprehensive, example-rich guide to creating network-based applications using the Perl programming language. Among its many capabilities, modern Perl provides a straightforward and powerful interface to TCP/IP, and this book shows you how to leverage these... |  |  MP3: The Definitive GuideMP3, standing for MPEG-1, Layer 3, is a codec for compressing the size of audio files for digital distribution. Much more than a definition, MP3 is nothing less than a cultural and economic revolution on the Internet. Every day, hundreds of thousands of MP3 music files are searched for, shared, recorded and listened to by computer and Internet... |  |  Equidistribution in Number Theory, An Introduction
From July 11th to July 22nd, 2005, a NATO advanced study institute, as part
of the series “S´eminaire de math´ematiques sup´erieures”, was held at the Universit
´e de Montr´eal, on the subject Equidistribution in the theory of numbers.
There were about one hundred participants from sixteen... |
|
 The Lanczos Method: Evolution and Application (Software, Environments and Tools)'I recommend this book to anyone who wants to appreciate the often subtle interactions between algorithm research and engineering applications. For the engineer, it comprehensively summarizes 25 years of intellectual development in the understanding of the basic Lanczos algorithm and its many variants. For the numerical analysts, it describes the... |  |  sendmail, 3rd EditionThe new edition of sendmail has been completely revised to cover sendmail 8.12--a version with more features and fundamental changes than any previous version of the Unix-based email routing program. Because the latest version of sendmail differs so significantly from earlier versions, a massive rewrite of this... |  |  |
|
 |  |  Handbook of Computer Crime Investigation: Forensic Tools & TechnologyComputers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital... |  |  |
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 |