Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Structures and Algorithm Analysis in C (2nd Edition)
Data Structures and Algorithm Analysis in C (2nd Edition)

This book describes data structures, methods of organizing large amounts of data, and algorithm analysis, the estimation of the running time of algorithms. As computers become faster and faster, the need for programs that can handle large amounts of input becomes more acute. Paradoxically, this requires more careful attention...

Data Structures and Algorithm Analysis in Java (3rd Edition)
Data Structures and Algorithm Analysis in Java (3rd Edition)

This new Java edition describes data structures, methods of organizing large amounts of data, and algorithm analysis, the estimation of the running time of algorithms. As computers become faster and faster, the need for programs that can handle large amounts of input becomes more acute. Paradoxically, this requires more...

Apache Solr 3 Enterprise Search Server
Apache Solr 3 Enterprise Search Server
If you are a developer building an application today then you know how important a good search experience is. Apache Solr, built on Apache Lucene, is a wildly popular open source enterprise search server that easily delivers powerful search and faceted navigation features that are elusive with databases. Solr supports complex search criteria,...
Pro iOS Apps Performance Optimization (Professional Apress)
Pro iOS Apps Performance Optimization (Professional Apress)

Today's iPhone and iPad apps developers are often running into the need to refine, improve and optimize their apps performances. As more complex apps can be created, it is even more important for developers to deal with this critical issue. 

Pro iOS Apps Performance Tuning and Optimization covers many
...

Wireless Crime and Forensic Investigation
Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...

Codecharts: Roadmaps and blueprints for object-oriented programs
Codecharts: Roadmaps and blueprints for object-oriented programs
In this book we set out to investigate some of the most difficult problems that software engineering faces. Although a young discipline, it nonetheless faces the most difficult challenges, as software is the most complex artefact ever crafted by humankind. As such, many of the problems can be traced to inadequate abstraction....
Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion: Visual Quickstart Guide
Mac OS X Lion—or also simply called OS X Lion—is the latest version of the computer operating system that put the phrase graphic user interface in everyone’s vocabulary. With Mac OS, you can point, click, and drag to work with files, applications, and utilities. Because the same intuitive interface...
Managing Oracle Fusion Applications (Oracle Press)
Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole new level. Whether you’re in the IT department, a systems integrator, a business leader, or an end user, Fusion Applications has more of what you need, less of what you don’t, and some of what you didn’t even think possible.
...
The Complete Idiot's Guide to Upgrading and Repairing PCs (5th Edition) (Complete Idiot's Guides)
The Complete Idiot's Guide to Upgrading and Repairing PCs (5th Edition) (Complete Idiot's Guides)
This is a book about maintaining the single most complex, unfathomable, and overhyped appliance you will ever own. Upgrading and maintaining your computer is a difficult and bewildering task, and yet you are the most qualified person to handle it. The main reason is because you are perhaps the only person you can trust entirely to...
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
Hadoop: The Definitive Guide
Hadoop: The Definitive Guide
Hadoop got its start in Nutch. A few of us were attempting to build an open source web search engine and having trouble managing computations running on even a handful of computers. Once Google published its GFS and MapReduce papers, the route became clear. They’d devised systems to solve precisely the...
Scala in Depth
Scala in Depth
In fall 2010 Michael Stephens from Manning contacted me about writing a Scala Book. I was working for a small virtualization/security startup where I had been learning Scala and applying it to our codebase. During that first conversation Michael and I discussed the Scala ecosystem and what kind of a book would best...
Result Page: 388 387 386 385 384 383 382 381 380 379 378 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy