Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Database Systems Concepts with Oracle CD
Database Systems Concepts with Oracle CD

The Fourth edition of Database System Concepts has been extensively revised from the 3rd edition. The new edition provides improved coverage of concepts, extensive coverage of new tools and techniques, and updated coverage of database system internals. This text is intended for a first course in databases at the junior or senior...

Practical Statistics for Data Scientists: 50 Essential Concepts
Practical Statistics for Data Scientists: 50 Essential Concepts

Statistical methods are a key part of of data science, yet very few data scientists have any formal statistics training. Courses and books on basic statistics rarely cover the topic from a data science perspective. This practical guide explains how to apply various statistical methods to data science, tells you how to avoid their...

JavaScript Step by Step
JavaScript Step by Step

Much has changed since the first edition of JavaScript Step by Step was written in 2007. The underlying JavaScript specification received a major update; Microsoft released Windows Internet Explorer 8—and now 9 (which is about to be released as I write this); JavaScript development frameworks have matured and are now ubiquitous; and...

BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Multiple Wiener-Itô Integrals: With Applications to Limit Theorems
Multiple Wiener-Itô Integrals: With Applications to Limit Theorems

The goal of this Lecture Note is to prove a new type of limit theorems for normalized sums of strongly dependent random variables that play an important role in probability theory or in statistical physics. Here non-linear functionals of stationary Gaussian fields are considered, and it is shown that the theory of Wiener–Itô...

Deploying Raspberry Pi in the Classroom
Deploying Raspberry Pi in the Classroom

Learn how to deploy Raspberry Pi computers in a classroom or lab situation and how to navigate the hardware and software choices you face.

Deploying Raspberry Pi in the Classroom equips you with the skills and knowledge to plan and execute a deployment of Raspberry Pi computers in the classroom.  Teachers and IT...

Unifying Theories of Programming and Formal Engineering Methods: International Training School on Software Engineering, Held at ICTAC 2013, Shanghai, ... Lectures (Lecture Notes in Computer Science)
Unifying Theories of Programming and Formal Engineering Methods: International Training School on Software Engineering, Held at ICTAC 2013, Shanghai, ... Lectures (Lecture Notes in Computer Science)

This book presents 5 tutorial lectures by leading researchers given at the ICTAC 2013 Software Engineering School on Unifying Theories of Programming and Formal Engineering Methods, held in Shanghai, China in August 2013.The lectures are aimed at postgraduate students, researchers, academics, and industrial engineers. They cover topics such...

Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Adventures in Coding
Adventures in Coding

Learn to code the "fun" way with eleven real projects for true beginners!

Adventures in Coding" is written specifically for young people who want to learn how to code, but don't know where to begin. No experience? No problem! This book starts from the very beginning to take you from newbie to app-builder in...
Professional Refactoring in C# & ASP.NET (Wrox Programmer to Programmer)
Professional Refactoring in C# & ASP.NET (Wrox Programmer to Programmer)

Refactoring is an effective way to quickly uncover problematic code and fix it. In this first book to provide a hands-on approach to refactoring in C# and ASP.NET, you'll discover to apply refactoring techniques to manage and modify your code. Plus, you'll learn how to build a prototype application from scratch and discover how to refactor the...

Quantum Approach to Informatics
Quantum Approach to Informatics
An essential overview of quantum information

Information, whether inscribed as a mark on a stone tablet or encoded as a magnetic domain on a hard drive, must be stored in a physical object and thus made subject to the laws of physics. Traditionally, information processing such as computation occurred in a framework governed by laws of classical...

Result Page: 55 54 53 52 51 50 49 48 47 46 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy