Home | Amazing | Today | Tags | Publishers | Years | Search 
Design for Hackers: Reverse Engineering Beauty
Design for Hackers: Reverse Engineering Beauty

The smash hit introductory design book that debuted at #18 on Amazon
Hackers are able to accomplish so much in so little time because they come from a community that's built upon sharing knowledge. When it comes to programming, they can learn whatever they need to learn by reading manuals, or simply typing in a Google
...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

The Finite Element Method: Theory, Implementation, and Applications (Texts in Computational Science and Engineering)
The Finite Element Method: Theory, Implementation, and Applications (Texts in Computational Science and Engineering)

This book gives an introduction to the finite element method as a general computational method for solving partial differential equations approximately. Our approach is mathematical in nature with a strong focus on the underlying mathematical principles, such as approximation properties of piecewise polynomial spaces, and variational...

A Course in Real Analysis
A Course in Real Analysis

A Course in Real Analysis provides a firm foundation in real analysis concepts and principles while presenting a broad range of topics in a clear and concise manner. This student-oriented text balances theory and applications, and contains a wealth of examples and exercises. Throughout the text, the authors adhere to the idea that most...

Effective JavaScript: 68 Specific Ways to Harness the Power of JavaScript (Effective Software Development Series)
Effective JavaScript: 68 Specific Ways to Harness the Power of JavaScript (Effective Software Development Series)

“It’s uncommon to have a programming language wonk who can speak in such comfortable and friendly language as David does. His walk through the syntax and semantics of JavaScript is both charming and hugely insightful; reminders of gotchas complement realistic use cases, paced at a comfortable curve....

Enterprise Architecture at Work: Modelling, Communication and Analysis (The Enterprise Engineering Series)
Enterprise Architecture at Work: Modelling, Communication and Analysis (The Enterprise Engineering Series)
Many stakeholders within and outside the company can be identified, ranging from top-level management to software engineers. Each stakeholder requires specific information presented in an accessible way, to deal with the impact of such wide-ranging developments. To predict the effects of such developments and modifications of an...
Tools for Signal Compression: Applications to Speech and Audio Coding (ISTE)
Tools for Signal Compression: Applications to Speech and Audio Coding (ISTE)
In everyday life, we often come in contact with compressed signals: when using mobile telephones, mp3 players, digital cameras, or DVD players. The signals in each of these applications, telephone-band speech, high fidelity audio signal, and still or video images are not only sampled and quantized to put them into a form suitable for...
Pen-and-Paper User Interfaces: Integrating Printed and Digital Documents (Human-Computer Interaction Series)
Pen-and-Paper User Interfaces: Integrating Printed and Digital Documents (Human-Computer Interaction Series)

Even at the beginning of the 21st century, we are far from becoming paperless. Pen and paper is still the only truly ubiquitous information processing technology. Pen-and-paper user interfaces bridge the gap between paper and the digital world. Rather than replacing paper with electronic media, they seamlessly integrate both worlds in a...

Real Analysis and Foundations, Second Edition (Textbooks in Mathematics)
Real Analysis and Foundations, Second Edition (Textbooks in Mathematics)

Students preparing for courses in real analysis often encounter either very exacting theoretical treatments or books without enough rigor to stimulate an in-depth understanding of the subject. Further complicating this, the field has not changed much over the past 150 years, prompting few authors to address the lackluster or overly complex...

Distributed Graph Algorithms for Computer Networks (Computer Communications and Networks)
Distributed Graph Algorithms for Computer Networks (Computer Communications and Networks)

This book presents a comprehensive review of key distributed graph algorithms for computer network applications, with a particular emphasis on practical implementation. Topics and features: introduces a range of fundamental graph algorithms, covering spanning trees, graph traversal algorithms, routing algorithms, and self-stabilization;...

Real Analysis: A Historical Approach (Pure and Applied Mathematics)
Real Analysis: A Historical Approach (Pure and Applied Mathematics)

A provocative look at the tools and history of real analysis

This new edition of Real Analysis: A Historical Approach continues to serve as an interesting read for students of analysis. Combining historical coverage with a superb introductory treatment, this book helps readers easily make the transition from concrete...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy