Home | Amazing | Today | Tags | Publishers | Years | Search 
UNIX for Programmers and Users (3rd Edition)
UNIX for Programmers and Users (3rd Edition)

For an introductory course on UNIX.

UNIX for Programmers and Users, Third Edition follows in the tradition of previous editions to provide students with complete, up-to-date coverage of UNIX. In this new edition they will find information on basic concepts,...

Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)

This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...

Bosch
Bosch
“The difference between this painter’s works and those of others: they seek to paint men as they appear on the outside, whereas he endeavours to paint the inner man, as he is on the inside.”

1453: Birth of Hieronymus Van Aken in ‘s-Hertogenbosch (now Bois-le-Duc). His family, of...
Transactions on Petri Nets and Other Models of Concurrency VIII (Lecture Notes in Computer Science)
Transactions on Petri Nets and Other Models of Concurrency VIII (Lecture Notes in Computer Science)

The 8th volume of ToPNoC contains revised and extended versions of a selection of the best workshop papers presented at the 33rd International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (Petri Nets 2012). The 10 papers cover a diverse range of topics including model checking and system verification,...

CompTIA Network+ N10-006 Cert Guide
CompTIA Network+ N10-006 Cert Guide

This approved study guide helps you master topics on the CompTIA Network+ N10-006 exam, including the following:

  •  Computer network fundamentals
  • The OSI model and TCP/IP stack
  • ...
ArcGIS for JavaScript developers by Example
ArcGIS for JavaScript developers by Example

Key Features

  • Unshackle your GIS application from a workstation! Get running with three major web mapping projects covering all the important aspects of the ArcGIS JavaScript API.
  • Set a strong foundation for the ArcGIS JavaScript API and modular coding with dojo.
  • Gain a crystal clear...
Exploring: Microsoft Excel 2013, Comprehensive (Exploring for Office 2013)
Exploring: Microsoft Excel 2013, Comprehensive (Exploring for Office 2013)

This book offers full, comprehensive coverage of Excel.

Move students beyond the point-and-click.

 

The goal of the Exploring series is to move students beyond the point and click, to understanding the why and how...

Overview of the PMBOK® Guide: Paving the Way for PMP® Certification
Overview of the PMBOK® Guide: Paving the Way for PMP® Certification

This book is a valuable resource as it provides an introduction to project management’s generally recognized good practices as described in A Guide to the Project Management Body of Knowledge (PMBOK® Guide)– Fourth Edition, published by Project Management Institute (PMI), the world’s leading association...

Wiley Encyclopedia of Computer Science and Engineering, 5 Volume Set
Wiley Encyclopedia of Computer Science and Engineering, 5 Volume Set

Wiley Encyclopedia of Computer Science and Engineering, 5-volume set, includes over 450 A to Z articles addressing the latest advances and findings in computer science and engineering, in addition to important topics of interest to computer scientists and engineers, including standards, electronic commerce, financial engineering, and computer...

Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7 (EX200 and EX300) (Certification Guide)
Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7 (EX200 and EX300) (Certification Guide)

Red Hat RHCSA/RHCE 7 Cert Guide contains proven study features that allow you to succeed on the exam the first time. Best-selling author and top Linux consultant Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness to improve both your conceptual knowledge and...

Computer Network Security and Cyber Ethics, 4th ed.
Computer Network Security and Cyber Ethics, 4th ed.

In its 4th edition, this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves and our society. This new edition aims to integrate security education and awareness with discussions...

Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy