Home | Amazing | Today | Tags | Publishers | Years | Search 
TCP/IP Architecture, Design and Implementation in Linux (Practitioners)
TCP/IP Architecture, Design and Implementation in Linux (Practitioners)
This book provides thorough knowledge of Linux TCP/IP stack and kernel framework for its network stack, including complete knowledge of design and implementation. Starting with simple client-server socket programs and progressing to complex design and implementation of TCP/IP protocol in linux, this book provides different aspects of socket...
A Field Guide to Genetic Programming
A Field Guide to Genetic Programming
Genetic programming (GP) is a systematic, domain-independent method for getting computers to solve problems automatically starting from a high-level statement of what needs to be done. Using ideas from natural evolution, GP starts from an ooze of random computer programs, and progressively refines them through processes of mutation and sexual...
Total Leopard: The Macworld OS X 10.5 Superguide
Total Leopard: The Macworld OS X 10.5 Superguide
Get up to Speed with Mac OS X 10.5

Nobody spends more time with Apple's computers and software than the writers and editors at Macworld, the world's foremost Mac authority. Now Macworld's team of experts take you inside Apple's latest operating system, Mac OS X 10.5, to help you master important new features, discover hidden...

Dictionary of Computing
Dictionary of Computing
This dictionary provides the user with a comprehensive range of the vocabulary used in the field of computing. It covers all aspects of computing, including hardware, software, peripherals, networks and programming, as well as many applications in which computers are used, such as the Internet or desktop publishing. It also describes the latest...
Google Hacking for Penetration Testers, Volume 2
Google Hacking for Penetration Testers, Volume 2
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google...
Building powerful and robust websites with Drupal 6
Building powerful and robust websites with Drupal 6
This book updates the bestselling Drupal: Creating Blogs, Forums, Portals, and Community Websites for Drupal 6, the latest, much improved version of this popular open-source Content Management System. Targeting readers with little experience in website design, unfamiliar with PHP, MySQL or HTML, and with little to no experience of Drupal, it looks...
C++ for Business Programmers (2nd Edition)
C++ for Business Programmers (2nd Edition)
C++ for Business Programming, Second Edition is an introduction to C++ programming. The power of C++ lies in its object-oriented extensions of the C language. However, we believe that for beginning students it is best to learn the basics of programming without the extra encumbrance of having to learn object-oriented concepts. Therefore, the book is...
Macs All-in-One Desk Reference For Dummies (Computer/Tech)
Macs All-in-One Desk Reference For Dummies (Computer/Tech)
Welcome to the wonderful world of the Mac! Whether you’ve just decided to switch from Windows or you’ve been using a Mac for awhile and want to take advantage of all its bells and whistles, Macs All-in-One Desk Reference For Dummies is the perfect guidebook to Mac land.

You probably already know that Macs were made for...

Java(tm) for S/390® and AS/400® COBOL Programmers
Java(tm) for S/390® and AS/400® COBOL Programmers
Written by mainframe and midrange professionals George Farr and Phil Coulthard, Java for S/390 & AS/400 COBOL Programmers is designed to help COBOL programmers make the jump to Java. It teaches COBOL programmers how to read and write Java programs and helps them understand the concepts necessary to continue to improve their Java skills. Rather...
DNA Computing Models (Advances in Information Security)
DNA Computing Models (Advances in Information Security)
Sir Francis Crick would undoubtedly be at the front of the line ordering this fascinating book. Being one of the discoverers of DNA, he would be amazed at how his work has been applied to mankind's most important invention, the computer. DNA contains the genetic instructions for the biological development of cellular life forms or viruses. DNA...
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are...
Microsoft® Office Publisher 2007 Step by Step
Microsoft® Office Publisher 2007 Step by Step
Work at your own pace through the easy numbered steps, practice files on CD, helpful hints, and troubleshooting tips to master the fundamentals of communicating your message effectively with the latest version of Office Publisher. Youll learn how to create professional-looking marketing and business materials, such as cards, flyers, and...
Result Page: 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy