Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guide to Advanced Empirical Software Engineering
Guide to Advanced Empirical Software Engineering
Empirical studies have become an integral element of software engineering research and practice. This unique text/reference includes chapters from some of the top international empirical software engineering researchers and focuses on the practical knowledge necessary for conducting, reporting and using empirical methods in software engineering....
Bioanalytical Chemistry
Bioanalytical Chemistry
Bioanalytical chemistry is playing an increasingly central role in the fields of academic and industrial science. It overlaps with a diverse range of disciplines, including biotechnology, biopharmaceuticals, and diagnostics–all of which makes a comprehensive introduction to the subject even more essential for students and researchers.

...

XMPP: The Definitive Guide: Building Real-Time Applications with Jabber Technologies
XMPP: The Definitive Guide: Building Real-Time Applications with Jabber Technologies

This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). This open technology for real-time communication is used in many diverse applications such as instant messaging, Voice over IP, real-time collaboration, social networking, microblogging, lightweight middleware, cloud...

Arabic For Dummies (Language & Literature)
Arabic For Dummies (Language & Literature)

Your survival guide for everyday words and expressions

Your fun and friendly guide to Modern Standard Arabic

This unintimidating guide will help you start speaking Modern Standard Arabic — beginning today! Whether you're a student, a traveler, or you work in business...

Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Powerboater's Guide to Electrical Systems, Second Edition
Powerboater's Guide to Electrical Systems, Second Edition
Understand, troubleshoot, repair, and upgrade your boat’s electrical systems

Frustrated by the high cost of basic electrical work but nervous about tackling such projects yourself? Get sound advice and guidance from author Ed Sherman, who wrote and teaches the American Boat & Yacht Council’s...

Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Computational Physics
Computational Physics
Computational physics book that emphasizes the physics that can be done with numerical/computational methods rather than just the methods themselves. Uses True Basic. (Representative programs on WWW). Praised for its coverage of many interesting topics in pure and applied physics.

From the Publisher
...
Delivering Utility Computing: Business-driven IT Optimization
Delivering Utility Computing: Business-driven IT Optimization
Learn how to design and deploy utility computing systems to save costs and improve the value that IT delivers.

The economic downturn that occurred after the .com boom and bust has put the cost of IT in the spotlight.  By following the principles of utility computing, also known as on-demand computing, real-time...

A Beginner's Guide to Gambas: Programming
A Beginner's Guide to Gambas: Programming
A Beginner's Guide to Gambas is the first definitive reference for the Linux-based Gambas programming language. Gambas ships with a graphical development environment based on the Basic programming language. It supports object-oriented programming and is similar to Microsoft's Visual Basic product. Gambas uses the Qt toolkit and supports other...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Ship-shaped Offshore Installations: Design, Building, and Operation
Ship-shaped Offshore Installations: Design, Building, and Operation
Ship-shaped offshore units are some of the more economical systems for the development of offshore oil and gas, and are often preferred in marginal fields. These systems are especially attractive to develop oil and gas fields in deep and ultra-deep water areas and remote locations away from existing pipeline infrastructures. Recently, the...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy