 |
|
 HTI+ Exam Cram 2
Welcome to the Home Technology Integrator (HTI+) Exam Cram 2! This book is designed to help you prepare to take—and pass—the Computing Technology Industry Association (CompTIA) certification exams HT0-101, "Residential Systems," and HT0-102, "Systems Infrastructure and Integration." This... |  |  Data Structures and Algorithms in Java
This international student version of Data Structures and Algorithms in Java provides an introduction to data structures and algorithms, including their design, analysis, and implementation. In terms of curricula based on the IEEEIACM 2001 Computing Curriculum, this book is appropriate for use in the courses CS102 (1I01B versions), CS103... |  |  XNA 4.0 Game Development by Example: Beginner's Guide - Visual Basic Edition
The Microsoft XNA Framework provides a powerful set of tools to allow development teams
of any size, from the individual developer to larger independent teams, to rapidly develop
high-performance quality games for multiple Microsoft-related platforms.
This book will present a series of video games, utilizing Visual Basic and... |
|
 Lift in Action: The Simply Functional Web Framework for Scala
The web has completely revolutionized the way we live our lives—the average person
in the UK now does an average of six Google searches a day. Within the lifetime of one
generation, our entire society has changed, and it continues to be catalyzed by technology
in a very fundamental way. For me, this is the most fascinating thing... |  |  MongoDB in Action
Databases are the workhorses of the information age. Like Atlas, they go largely unnoticed
in supporting the digital world we’ve come to inhabit. It’s easy to forget that our
digital interactions, from commenting and tweeting to searching and sorting, are in
essence interactions with a database. Because of this fundamental... |  |  Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
|
|
Result Page: 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 |