Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Good Habits for Great Coding: Improving Programming Skills with Examples in Python
Good Habits for Great Coding: Improving Programming Skills with Examples in Python

Improve your coding skills and learn how to write readable code. Rather than teach basic programming, this book presumes that readers understand the fundamentals, and offers time-honed best practices for style, design, documenting, testing, refactoring, and more. 

Taking an informal, conversational tone,...

Node.js for PHP Developers: Porting PHP to Node.js
Node.js for PHP Developers: Porting PHP to Node.js

If you’re an experienced PHP developer, you already have a head start on learning how to write Node.js code. In this book, author Daniel Howard demonstrates the remarkable similarities between the two languages, and shows you how to port your entire PHP web application to Node.js. By comparing specific PHP features with their...

Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Amazon Web Services: Migrating Your .NET Enterprise Application
Amazon Web Services: Migrating Your .NET Enterprise Application

Amazon Web Services is an Infrastructure as a Service (IaaS) platform in the Cloud, which businesses can take advantage of as their needs demand. The Amazon Cloud provides the enterprise with the flexibility to choose whichever solution is required to solve specific problems, ultimately reducing costs by only paying for what you use.

...

RESTful Java Patterns and Best Practices
RESTful Java Patterns and Best Practices

Learn best practices to efficiently build scalable, reliable, and maintainable high performance RESTful services

About This Book

  • Learn how to build RESTful services with JAX-RS 2.0
  • Efficiently use the techniques outlined to build reliable and highly available applications based on...
Official (ISC)® Guide to the CISSP®-ISSEP® CBK®
Official (ISC)® Guide to the CISSP®-ISSEP® CBK®

Official (ISC)2В® Guide to the CISSP-ISSEPВ® CBKВ® provides an inclusive analysis of all of the topics covered on the newly created ISSEP Exam. The first fully comprehensive guide to the test, it promotes understanding of the four ISSEP domains. It explains ISSE by comparing it to a traditional Systems Engineering model,...

The Lens: A Practical Guide for the Creative Photographer
The Lens: A Practical Guide for the Creative Photographer

Which lens should I buy for my camera?

It's such a simple question, but choosing the right lens or lenses is actually one of the most important photographic decisions you can make. Nothing affects the quality of a photo more than the lens. It's no longer just about the megapixels-it's the glass that makes all...

Microsoft Office 2010 for Windows: Visual QuickStart
Microsoft Office 2010 for Windows: Visual QuickStart

Visual QuickStart Guides, designed in an attractive tutorial and reference format, are the quickest, easiest, and most thorough way to learn applications, tasks, and technologies. The Visual QuickStart Guides are a smart choice and guide the learner in a friendly and respectful tone. Visually presented with copious screenshots, the focused...

Software Build Systems: Principles and Experience
Software Build Systems: Principles and Experience

Are you a software developer? Are you interested in how build systems work? You’re reading this book; so there’s a good chance you answered “Yes” to both questions. On the other hand, many software developers aren’t interested in how their program is compiled. Most people just want to press a button and...

Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
George Silverman's Explanation
George Silverman's Explanation
WHAT do I know of Hoghton Towers? Very little; for I have been gratefully unwilling to disturb my first impressions. A house, centuries old, on high ground a mile or so removed from the road between Preston and Blackburn, where the first James of England, in his hurry to make money by making baronets, perhaps made some of those remunerative...
Optimal Design of Queueing Systems
Optimal Design of Queueing Systems

The First Comprehensive Book on the Subject

Focusing on the underlying structure of a system, Optimal Design of Queueing Systems explores how to set the parameters of a queueing system, such as arrival and service rates, before putting it into operation. It considers various objectives, comparing...

Result Page: 13 12 11 10 9 8 7 6 5 4 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy