 |
|
|
 Rigorous Software Development: An Introduction to Program Verification
This book is about the use of techniques and tools for the design and implementation
of computer systems and software that are free from logical or functional flaws
(in the sense of functional requirements). The word rigorous in the title of this book
is justified by the fact that the arguments for such fault freeness have their roots... |  |  ActionScript 3.0 Game Programming University (2nd Edition)
When the first edition of ActionScript 3.0 Game Programming University came out,
ActionScript 3.0 was new. It was so new, in fact, that most programmers were still stuck
using older ActionScript 1.0 and 2.0.
But by now, most Flash developers have moved on to AS3, and they are loving the
speed, reliability and logical... |  |  R in Action
When I began writing this book, I spent quite a bit of time searching for a good
quote to start things off. I ended up with two. R is a wonderfully flexible platform
and language for exploring, visualizing, and understanding data. I chose the quote
from Alice in Wonderland to capture the flavor of statistical analysis today—an... |
|
 Guide to UNIX Using Linux (Networking)
Guide to UNIX Using Linux, Fourth Edition is updated to include new UNIX/Linux distributions,
networking utilities, new UNIX/Linux capabilities, and coverage of both the
GNOME and KDE desktops.The large array of commands, utilities, file systems, and other
information you learn here applies to any Linux system and most UNIX... |  |  Operating System Concepts Essentials
Operating systems are an essential part of any computer system. Similarly,
a course on operating systems is an essential part of any computer-science
education. This field is undergoing rapid change, as computers are now
prevalent in virtually every application, from games for children through the
most sophisticated planning tools for... |  |  |
|
 Grid and Cloud Database Management
Since the 1960s, database systems have been playing a relevant role in the
information technology field. By the mid-1960s, several systems were also available
for commercial purposes. Hierarchical and network database systems provided
two different perspectives and data models to organize data collections. In 1970,
E. Codd wrote a... |  |  WordPress 3 Ultimate Security
Most likely, today, some hacker tried to crack your WordPress site, its data and
content. Maybe that was just a one-off from some bored kid. Just as likely, it was an
automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it
was both.
Whether you've been successfully hacked already, else... |  |  |
|
Result Page: 1352 1351 1350 1349 1348 1347 1346 1345 1344 1343 1342 1341 1340 1339 1338 1337 1336 1335 1334 |