Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Structures and Algorithm Analysis in C++, Third Edition (Dover Books on Computer Science)
Data Structures and Algorithm Analysis in C++, Third Edition (Dover Books on Computer Science)
With its focus on creating efficient data structures and algorithms, this comprehensive text helps readers understand how to select or design the tools that will best solve specific problems. It uses Microsoft C++ as the programming language and is suitable for second-year data structure courses and computer science courses in...
JavaScript Programming: Pushing the Limits
JavaScript Programming: Pushing the Limits

Take your JavaScript knowledge as far as it can go

JavaScript has grown up, and it's a hot topic. Newer and fasterJavaScript VMs and frameworks built upon them have increased thepopularity of JavaScript for server-side web applications, and richJS applications are being developed for mobile devices. This bookdelivers a...

Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (2nd Edition) (Financial Times)

A practical guide for business calculations

Mastering Financial Mathematics in Microsoft © Excel provides a comprehensive set of tools, methods and formulas which apply Excel to solving mathematical problems.

The book:

  • Explains basic calculations for mathematical finance
  • ...
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

The thrilling memoir of the world's most wanted computer hacker

"Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed
...

IoT Security Issues
IoT Security Issues

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack...

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and...

T-SQL in One Hour a Day, Sams Teach Yourself
T-SQL in One Hour a Day, Sams Teach Yourself
Many excellent books about T-SQL are available, so how is this one different? In talking to the many people I meet in my travels around the country, I have heard one common complaint. Instead of the host of wonderful books available to expert database administrators (DBAs), most SQL Server readers yearn for a book targeted toward the...
System Parameter Identification: Information Criteria and Algorithms (Elsevier Insights)
System Parameter Identification: Information Criteria and Algorithms (Elsevier Insights)

Recently, criterion functions based on information theoretic measures (entropy, mutual information, information divergence) have attracted attention and become an emerging area of study in signal processing and system identification domain. This book presents a systematic framework for system identification and information processing,...

A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)

“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid...

Blockchain Basics: A Non-Technical Introduction in 25 Steps
Blockchain Basics: A Non-Technical Introduction in 25 Steps

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.

This book...

PowerShell in Depth: An administrator's guide
PowerShell in Depth: An administrator's guide

Summary

PowerShell in Depth is the kind of book you'll want open on your desk most of the time. With 40 short chapters, each focused on a specific area of PowerShell, you'll be able to find the answers you need quickly. Each chapter is concise and to-the-point, so you can spend less time reading and...

Project Managers at Work
Project Managers at Work

Read 25 in-depth, candid interviews with notable project managers. Discover how project managers work, what they do, how they adapt and make decisions, how they inspire and motivate others, what career lessons and advice they can share, and how they landed their current jobs either as project managers or in more senior positions thanks to...

Result Page: 460 459 458 457 456 455 454 453 452 451 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy