Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Professional Scala: Combine object-oriented and functional programming to build high-performance applications
Professional Scala: Combine object-oriented and functional programming to build high-performance applications

If your application source code is overly verbose, it can be a nightmare to maintain. Write concise and expressive, type-safe code in an environment that lets you build for the JVM, browser, and more.

Key Features

  • Expert guidance that shows you to efficiently use both object-oriented and...
DK Eyewitness Lisbon (Travel Guide)
DK Eyewitness Lisbon (Travel Guide)
Discover Europe's capital of cool

Whether you want to explore the jumbled streets of Alfama, take in the fantastic views from Castelo de São Jorge, or simply sample the city's iconic custard tarts, your DK Eyewitness travel guide makes sure you experience all that Lisbon has to offer.

As one
...
Inquisition in the Fourteenth Century: The Manuals of Bernard Gui and Nicholas Eymerich (Heresy and Inquisition in the Middle Ages)
Inquisition in the Fourteenth Century: The Manuals of Bernard Gui and Nicholas Eymerich (Heresy and Inquisition in the Middle Ages)
The Inquisition played a central role in European history. It moulded societies by enforcing religious and intellectual unity; it helped develop the judicial and police techniques which are the basis of those used today; and it helped lay the foundations for the persecution of witches. An understanding of the Inquisition is therefore...
Testing Extreme Programming
Testing Extreme Programming

Testing Extreme Programming is a practical tutorial that gives software builders a lucid understanding of this important aspect of development. This book demonstrates how testing is central to the XP project, clearly spelling out what testing should be done and when and how it should be...

A UML Pattern Language (Macmillan Technology Series)
A UML Pattern Language (Macmillan Technology Series)

This book is about how to model software systems and how to use those models. It is rooted in that emerging intellectual "ecosystem" comprising the various networks (the Internet, intranets, extranets, and so on), distributed objects, piecemeal development based on short development cycles, and something called...

Practical C++ Programming, Second Edition
Practical C++ Programming, Second Edition

This book is devoted to practical C++ programming. It teaches you not only the mechanics of the language, but also style and debugging. The entire life cycle of a program is discussed, including conception, design, writing, debugging, release, documentation, maintenance, and revision.

Style is emphasized....

Introduction to Computer Security
Introduction to Computer Security

In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security...

Learning SQL on SQL Server 2005
Learning SQL on SQL Server 2005

Anyone who interacts with today's modern databases needs to know SQL (Structured Query Language), the standard language for generating, manipulating, and retrieving database information. In recent years, the dramatic rise in the popularity of relational databases and multi-user databases has fueled a healthy demand for...

Mac OS X 10.4 Tiger : Visual QuickStart Guide
Mac OS X 10.4 Tiger : Visual QuickStart Guide
So you're finally ready to find out what all the fuss is about. Whether you're switching from Windows or upgrading from an older Mac OS, this task-based guide represents the surest way to go from 0 to 60 in no time flat with Apple's much anticipated Mac OS X Tiger--more mature, powerfully enhanced, and with more than 200 new features that will...
Black Art of Java Game Programming
Black Art of Java Game Programming
Gaming on the Web is the next blockbuster business. Have any doubts? The video game industry,
which already eclipses Hollywood in terms of revenue, targets the Web as the next huge growth area.
Software developers are busily porting games to the online environment, or developing entirely new
ones. And numerous popular Web sites, many
...
Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
Electronic Monitoring in the Workplace: Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions

Due to the use of new technologies, coupled with the fact that there is an increasing amount of work being done online, whether on the Internet, intranets, LANs or other networks, extensive employee monitoring by employers is inexpensive and easy. Employers have legitimate concerns about the efficiency of their employees and the quality of the...

unlimited object storage image
Result Page: 1431 1430 1429 1428 1427 1426 1425 1424 1423 1422 1421 1420 1419 1418 1417 1416 1415 1414 1413 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy