Home | Amazing | Today | Tags | Publishers | Years | Search 
Managing and Leading Software Projects
Managing and Leading Software Projects
Discover the fundamental techniques for managing and leading software projects

This book bridges the communication gap between project managers and software developers working toward the common goal of developing successful software products and software systems. It provides the insights, methods, tools, and techniques necessary to understand...

Creating Applications with Mozilla
Creating Applications with Mozilla
Mozilla is not just a browser. Mozilla is also a framework that allows developers to create cross-platform applications. Creating Applications with Mozilla explains how applications are created with Mozilla and provides step-by-step information about how you can create your own programs using Mozilla's powerful cross-platform development...
The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
The hacker subculture — shrouded in mystery, spiced with a hint of glamour, and thoroughly misunderstood by those who don't belong — was revealed in the original edition of The Best of 2600: A Hacker Odyssey. The book became an instant bestseller. If you're a 2600 subscriber, a member of the hacker community, a geek freak, or simply a...
Common Lisp Recipes: A Problem-Solution Approach
Common Lisp Recipes: A Problem-Solution Approach

Find solutions to problems and answers to questions you are likely to encounter when writing real-world applications in Common Lisp. This book covers areas as diverse as web programming, databases, graphical user interfaces, integration with other programming languages, multi-threading, and mobile devices as well as debugging techniques and...

Programming Python
Programming Python

As Python's creator. I'd like to say a few words about its origins, adding a bit of personal philosophy.

Over six years ago. in December 1989; I was looking for a "hobby" programming project that would keep me occupied during the week around Christmas. My office (a government-run research lab in Amsterdam)
...

Managing Humans: Biting and Humorous Tales of a Software Engineering Manager
Managing Humans: Biting and Humorous Tales of a Software Engineering Manager

The humor and insights in the 2nd Edition of Managing Humans are drawn from Michael Lopp's management experiences at Apple, Netscape, Symantec, and Borland, among others. This book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other and occasionally throw...

Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others

“All of our working lives we have heard the mantra, ‘a reputation lost is never regained.’ Still, the firms we work for, admire and invest in seem to take costly reputation hits all too often. Everyone interested in managing, regulating or investing in public firms will find Nir Kossovsky’s book a wonderful read...

Running Linux
Running Linux

Once a little-known productivity boost for personal computers, Linux is now becoming a central part of computing environments everywhere. This operating system now serves as corporate hubs, Web servers, academic research platforms, and program development systems. All along it's also managed to keep its original role as an...

Data Science from Scratch: First Principles with Python
Data Science from Scratch: First Principles with Python

Data science libraries, frameworks, modules, and toolkits are great for doing data science, but they’re also a good way to dive into the discipline without actually understanding data science. In this book, you’ll learn how many of the most fundamental data science tools and algorithms work by implementing them from...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Machine Learning Projects for .NET Developers
Machine Learning Projects for .NET Developers

Machine Learning Projects for .NET Developers shows you how to build smarter .NET applications that learn from data, using simple algorithms and techniques that can be applied to a wide range of real-world problems. You’ll code each project in the familiar setting of Visual Studio, while the machine learning logic uses F#, a...

The Browser Hacker's Handbook
The Browser Hacker's Handbook

Hackers exploit browser vulnerabilities to attack deep within networks

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security...

Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy