Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Erlang Programming
Erlang Programming

This book is an in-depth introduction to Erlang, a programming language ideal for any situation where concurrency, fault tolerance, and fast response is essential. Erlang is gaining widespread adoption with the advent of multi-core processors and their new scalable approach to concurrency. With this guide you'll learn how to write complex...

Next Generation Java Testing: TestNG and Advanced Concepts
Next Generation Java Testing: TestNG and Advanced Concepts
Enterprise Java developers must achieve broader, deeper test coverage, going beyond unit testing to implement functional and integration testing with systematic acceptance. Next Generation Java Testing introduces breakthrough Java testing techniques and TestNG, a powerful open source Java testing...
Final Cut Pro Workflows: The Independent Studio Handbook
Final Cut Pro Workflows: The Independent Studio Handbook
Film/Video/Production/Final Cut Pro

. . . with an easy style and great depth, Final Cut Pro Workflows: The Independent Studio Handbook is an enjoyable and important read. Osder and Carman offer a diverse background and extensive experience with Final Cut Pro.
Richard Harrington, president of RHED Pixel and author of Photoshop for
...
Beginning Scala
Beginning Scala
The open source Scala language is a Java–based dynamic scripting, functional programming language. Moreover, this highly scalable scripting language lends itself well to building Cloud–based/deliverable Software as a Service (SaaS) online applications.

Written by Lift Scala web framework founder and lead...

The J2EE Architect's Handbook
The J2EE Architect's Handbook
This handbook is a concise guide to architecting, designing, and building J2EE applications. Whether you're architect your first J2EE application or looking to keep your projects on-time and on-budget, you will refer to this handbook again and again.

You will discover how to: -- Design J2EE applications so that they are robust,
...
Foundations of Green IT: Consolidation, Virtualization, Efficiency, and ROI in the Data Center
Foundations of Green IT: Consolidation, Virtualization, Efficiency, and ROI in the Data Center
“This book comprehensively discusses design considerations for the truly energy efficient data center.”

Scott Davis, Chief Data Center Architect, Office of the CTO, VMware, Inc.

 

This Book Isn’t About...

Optimizing HPC Applications with Intel Cluster Tools: Hunting Petaflops
Optimizing HPC Applications with Intel Cluster Tools: Hunting Petaflops

Optimizing HPC Applications with Intel® Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for...

Production Rendering
Production Rendering

In the past, rendering systems used a range of different approaches, each compatible and able to handle certain kinds of images. However, the last few years have seen the development of practical techniques, which bring together many areas of research into stable, production ready rendering tools. Written by experienced graphics software...

Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Expert Python Programming
Expert Python Programming

Expert Python Programming shows how Python development should be done with best practices and expert design tips. This book is for Python developers who are already building applications, but want to build better ones by applying best practices and new development techniques to their projects. The reader is expected to have a sound background...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy