Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Programming with Rust: Build fast and resilient network servers and clients by leveraging Rust's memory-safety and concurrency features
Network Programming with Rust: Build fast and resilient network servers and clients by leveraging Rust's memory-safety and concurrency features
Learn to write servers and network clients using Rust
Key Features
  • Build a solid foundation in Rust while also mastering important network programming details
  • Leverage the power of a number of available libraries to perform network operations in Rust
  • Develop a fully...
States, Intergovernmental Relations, and Market Development: Comparing Capitalist Growth in Contemporary China and 19th Century United States (Governing China in the 21st Century)
States, Intergovernmental Relations, and Market Development: Comparing Capitalist Growth in Contemporary China and 19th Century United States (Governing China in the 21st Century)
This book is a theoretical and empirical analysis of institutional foundation of long-term economic growth from the perspective of state-market and central-local relations. The book argues that, in order to safeguard sustainable market development, it is necessary to centralize certain functions of the state to overcome local predatory...
Handbook of Temporal Reasoning in Artificial Intelligence, Volume 1 (Foundations of Artificial Intelligence)
Handbook of Temporal Reasoning in Artificial Intelligence, Volume 1 (Foundations of Artificial Intelligence)
This collection represents the primary reference work for researchers and students in the area of Temporal Reasoning in Artificial Intelligence. Temporal reasoning has a vital role to play in many areas, particularly Artificial Intelligence. Yet, until now, there has been no single volume collecting together the breadth of work in this area. This...
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Professional ASP.NET 4 in C# and VB
Professional ASP.NET 4 in C# and VB

This book was written to introduce you to the features and capabilities that ASP.NET 4 offers, as well as to give you an explanation of the foundation that ASP.NET provides. We assume you have a general understanding of Web technologies, such as previous versions of ASP.NET, Active Server Pages 2.0/3.0, or JavaServer Pages. If you understand...

Continuous Delivery with Visual Studio ALM  2015
Continuous Delivery with Visual Studio ALM 2015

This book is the authoritative source on implementing Continuous Delivery practices using Microsoft’s Visual Studio and TFS 2015. Microsoft MVP authors Mathias Olausson and Jakob Ehn translate the theory behind this methodology and show step by step how to implement Continuous Delivery in a real world environment.

Building...

Telesurgery
Telesurgery

Written by renowned international experts, this book explains technical issues, digital information processing, and provides collective experiences from practitioners who perform a wide range of telesurgery applications. The book lays the foundation for the globalization of surgical procedures, making possible the ability of a surgeon located...

Learn Python Programming: The no-nonsense, beginner's guide to programming, data science, and web development with Python 3.7, 2nd Edition
Learn Python Programming: The no-nonsense, beginner's guide to programming, data science, and web development with Python 3.7, 2nd Edition

Learn the fundamentals of Python (3.7) and how to apply it to data science, programming, and web development. Fully updated to include hands-on tutorials and projects.

Key Features

  • Learn the fundamentals of Python programming with interactive projects
  • Apply Python to data...
Designing Solutions With Com+ Technologies
Designing Solutions With Com+ Technologies

If you were hoping the recent announcements about the Microsoft .NET Framework would prevent you from having to learn the COM+ programming development model, you will be disappointed.

COM+ has gone through many evolutions since the introduction of OLE technology in the early releases of Microsoft Windows. The alphabet soup of OLE,...

Fourier Analysis on Finite Groups with Applications in Signal Processing and System Design
Fourier Analysis on Finite Groups with Applications in Signal Processing and System Design
Discover applications of Fourier analysis on finite non-Abelian groups

The majority of publications in spectral techniques consider Fourier transform on Abelian groups. However, non-Abelian groups provide notable advantages in efficient implementations of spectral methods.

Fourier Analysis on Finite Groups with Applications in...

Energy Evolution (The Eco-Technology Series)
Energy Evolution (The Eco-Technology Series)
Coincidence? Or perhaps not! Standing as we are on the threshold of a new era, the first dawning of a new age, there is an air of expectancy of things imminent and better. In a certain sense this has psychologically programmed us with a willingness to embrace new concepts, to inaugurate and accept far-reaching change. It is also a time to reflect...
Professional C# 4.0 and .NET 4 (Wrox Programmer to Programmer)
Professional C# 4.0 and .NET 4 (Wrox Programmer to Programmer)

This book starts by reviewing the overall architecture of .NET in order to give you the background you need to be able to write managed code. After that, the book is divided into a number of sections that cover both the C# language and its application in a variety of areas.

Part I: The C# Language: This section gives a good...

unlimited object storage image
Result Page: 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy