Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Accelerated C# 2005
Accelerated C# 2005

Accelerated C# 2005 teaches you both how to use core C# language concepts and wisely employ C# idioms and object-oriented design patterns--to exploit the power of C# and the common language runtime. You'll quickly master C# syntax while learning how the CLR simplifies many programming tasks. You'll also learn best practices that ensure...

Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Pattern Calculus: Computing with Functions and Structures
Pattern Calculus: Computing with Functions and Structures

The pattern calculus is a new foundation for computation, in which the expressive power of functions and of data structures are combined within pattern-matching functions. The best existing foundations focus on either functions, as in the lambda-calculus, or on data structures, as in Turing machines, or on compromises involving both, as in...

Microsoft Access 2010 VBA Programming Inside Out
Microsoft Access 2010 VBA Programming Inside Out

Microsoft Visual Basic for Applications (VBA) is an exceptional programming language and environment. The language has grown out of a need to have a programming language that would allow more business-focused individuals to write programs, but equally support the programming features that developers look for in a product. The...

Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Clojure High Performance Programming - Second Edition
Clojure High Performance Programming - Second Edition

Become an expert at writing fast and high performant code in Clojure 1.7.0

About This Book

  • Enhance code performance by using appropriate Clojure features
  • Improve the efficiency of applications and plan their deployment
  • A hands-on guide to designing Clojure programs to get...
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)

Your software needs to leverage multiple cores, handle thousands of users and terabytes of data, and continue working in the face of both hardware and software failure. Concurrency and parallelism are the keys, and Seven Concurrency Models in Seven Weeks equips you for this new world. See how emerging technologies such as actors and...

OpenCV 3 Computer Vision with Python Cookbook: Leverage the power of OpenCV 3 and Python to build computer vision applications
OpenCV 3 Computer Vision with Python Cookbook: Leverage the power of OpenCV 3 and Python to build computer vision applications

Recipe-based approach to tackle the most common problems in Computer Vision by leveraging the functionality of OpenCV using Python APIs

Key Features

  • Build computer vision applications with OpenCV functionality via Python API
  • Get to grips with image processing, multiple...
Designing Active Server Pages
Designing Active Server Pages
Designing Active Server Pages provides an important tool for often-overworked ASP programmers: a set of techniques for making the wisest use of the technology in a production environment. Targeting an audience of readers who already are seasoned in ASP, author Scott Mitchell explores techniques for producing "reusable and robust...
Fuzzy Quantifiers: A Computational Theory (Studies in Fuzziness and Soft Computing)
Fuzzy Quantifiers: A Computational Theory (Studies in Fuzziness and Soft Computing)
From a linguistic perspective, it is quantification which makes all the difference between “having no dollars” and “having a lot of dollars”. And it is the meaning of the quantifier “most” which eventually decides if “Most Americans voted Kerry” or “Most Americans voted Bush” (as it...
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy