|
|
|
|
|
Handbook of Constraint Programming (Foundations of Artificial Intelligence)This encyclopedic work covers twenty-plus years of research in constraint programming in a readable, accessible and appealing way. For someone outside the field wondering what Constraint Programming is all about, this is the perfect introduction, and the book will remain useful as a reference for years. Michael Trick, Professor of Operations... | | Programming the iPhone User ExperienceApple's iPhone and iPod Touch not only feature the world's most powerful mobile operating system, they also usher in a new standard of human-computer interaction through gestural interfaces and multi-touch navigation. This book provides you with a hands-on, example-driven tour of UIKit, Apple's user interface toolkit, and includes common design... | | |
|
|
Network Attacks and Exploitation: A Framework
Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate... | | Enterprise Risk Management: From Incentives to Controls
A fully revised second edition focused on the best practices of enterprise risk management
Since the first edition of Enterprise Risk Management: From Incentives to Controls was published a decade ago, much has changed in the worlds of business and finance. That's why James Lam has returned with a new edition of... | | Docker Bootcamp
Fast, intensive, and effective Docker learning
About This Book
-
Get well-versed with Docker in 7 days
-
Identify and resolve common problems faced by users while working with Docker
-
A fast-paced guide that will focus on all the core Docker functionalities
|
|
|
Result Page: 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 |