Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts

A comprehensive guide to exploring software architecture concepts and implementing best practices

Key Features

  • Enhance your skills to grow your career as a software architect
  • Design efficient software architectures using patterns and best practices
  • Learn...
Python Crash Course: A Hands-On, Project-Based Introduction to Programming
Python Crash Course: A Hands-On, Project-Based Introduction to Programming
Python Crash Course is a fast-paced, thorough introduction to Python that will have you writing programs, solving problems, and making things that work in no time.

In the first half of the book, you’ll learn about basic programming concepts, such as lists, dictionaries, classes, and loops, and practice writing
...
The Joys of Hashing: Hash Table Programming with C
The Joys of Hashing: Hash Table Programming with C
Build working implementations of hash tables, written in the C programming language. This book starts with simple first attempts devoid of collision resolution strategies, and moves through improvements and extensions illustrating different design ideas and approaches, followed by experiments to validate the choices. ...
Linux: The Ultimate Step by Step Guide to Quickly and Easily Learning Linux
Linux: The Ultimate Step by Step Guide to Quickly and Easily Learning Linux
LINUX The Ultimate Step by Step Guide to Quickly and Easily Learning Linux This book is a precise yet comprehensive manual that includes all the tips, secrets and procedures that will help you learn Linux in a fun, fast and easy manner. It is a step-by-step guide that contains an in-depth analysis of contemporary and proven steps that will help...
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

eBay Business All-in-One For Dummies (For Dummies (Business & Personal Finance))
eBay Business All-in-One For Dummies (For Dummies (Business & Personal Finance))

The selling, marketing, and business tips you need to succeed

eBay is the perfect place to learn the ropes of what it's like running an online business. It provides the tools, technology, and platform a would-be entrepreneur needs to launch their first successful small business. It takes some know-how, however, to get...
Introduction to DevOps with Chocolate, LEGO and Scrum Game
Introduction to DevOps with Chocolate, LEGO and Scrum Game

Discover a role-based simulation game designed to introduce DevOps in a very unusual way. Working with LEGO and chocolate, using avatars, personas, and role cards, you will gain an understanding of the Dev and Ops roles as well as their interdependencies. Throughout the game, players go through a range of emotions and learn to expand...

Cisco ASA Configuration (Networking Professional's Library)
Cisco ASA Configuration (Networking Professional's Library)
Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of...
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

The Coder's Path to Wealth and Independence
The Coder's Path to Wealth and Independence

Developers, programmers, technical architects, and consultants: You are highly skilled and have deep commitment to your craft as well as the motivation to excel. It’s time to step away from the perceived security of a full-time salaried position, or a marginally successful solo business, and step into a world of freedom, independence,...

Nutrition and Well-being a To Z; 2V.
Nutrition and Well-being a To Z; 2V.
Nutrition is one of the most important factors that impact health in all areas of the lifecycle. Pregnant women need adequate food and health care to deliver a healthy baby who has a good birth weight and a fighting chance for survival. In many regions of the world, the infant mortality rate is very high, meaning that many...
Advances in Computer-Supported Learning
Advances in Computer-Supported Learning
The Internet and growth of computer networks have eliminated geographic barriers, creating an environment where education can be brought to a student no matter where that student may be. The success of distance learning programs and the availability of many Web-supported applications and multimedia resources have increased the effectiveness of...
Result Page: 51 50 49 48 47 46 45 44 43 42 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy