Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scientific Computing with Python 3
Scientific Computing with Python 3

Key Features

  • Your ultimate resource for getting up and running with Python numerical computations
  • Explore numerical computing and mathematical libraries using Python 3.x code with SciPy and NumPy modules
  • A hands-on guide to implementing mathematics with Python, with complete...
Building JavaScript Games: for Phones, Tablets, and Desktop
Building JavaScript Games: for Phones, Tablets, and Desktop

Building JavaScript Games teaches game programming through a series of engaging, arcade-style games that quickly expand your JavaScript and HTML5 skills. JavaScript is in the top ten most-used programming languages world wide, and is the basis for applications that can run in any modern browser, on any device from smart phone to...

The Myths of Innovation
The Myths of Innovation
How do you know whether a hot technology will succeed or fail? Or where the next big idea will come from? The best answers come not from the popular myths we tell about innovation, but instead from time-tested truths that explain how we've made it this far. This book shows the way.

In The Myths of Innovation, bestselling
...
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Migrating to IPv6: A Practical Guide to Implementing IPv6 in Mobile and Fixed Networks
Exhaustion of address space and global routing table growth necessitate important revisions to the current version of the Internet Protocol, IPv4. IP version 6 offers greater address space and additional features to support the evolving requirements of Internet applications. Deployed alongside current IPv4 networks, IPv6 will restore the...
Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
CTOs at Work
CTOs at Work

Scott Donaldson, Stanley Siegel and Gary Donaldson interview many of the world's most influential chief technology officers in CTOs at Work, offering a brand-new companion volume to the highly acclaimed elite At Work books including Coders at Work, CIOS at Work and...

Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”  

John McAuley,EMC Corporation

"This book details innovative technology...

AdvancED Flex Application Development: Building Rich Media X
AdvancED Flex Application Development: Building Rich Media X
Many Flex books cover the basics—this book does something different, and goes far further. The authors, leading Flash platform developers at Almer/Blank, working with Adobe User Group communities, are the creators of the Rich Media Exchange (RMX), a social media network for Adobe developers. In covering just how the RMX was built, this book...
Continuous Delivery and DevOps: A Quickstart guide
Continuous Delivery and DevOps: A Quickstart guide

Streamline and optimize your workflow with this fast and engaging guide to continuous delivery and DevOps. Delivering quality software every time will become a way of life.

Overview

  • Real world and realistic examples of how to go about implementing continuous delivery and DevOps
  • Learn...
Advanced Rails
Advanced Rails
Ready to go to the next level with Rails? From examining the parts of Ruby that make this framework possible to deploying large Rails applications, Advanced Rails offers you an in-depth look at techniques for dealing with databases, security, performance, web services and much more. Chapters in this book help you understand not only the tricks and...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy