Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Essentials of Computer Architecture
Essentials of Computer Architecture

This book began when I was assigned to help salvage an undergraduate computer organization course. The course had suffered years of neglect: it had been taught by a series of professors, mostly visitors, who had little or no interest or background in digital hardware, and the curriculum had deteriorated to a potpourri of topics that...

Programming Google App Engine
Programming Google App Engine
On the Internet, popularity is swift and fleeting. A mention of your website on a popular blog can bring 300,000 potential customers your way at once, all expecting to find out who you are and what you have to offer. But if you’re a small company just starting out, your hardware and software aren’t...
iOS Development with Xamarin Cookbook - More than 100 Recipes, Solutions, and Strategies for Simpler iOS Development
iOS Development with Xamarin Cookbook - More than 100 Recipes, Solutions, and Strategies for Simpler iOS Development

Key Features

  • Explore the new features of Xamarin and learn how to use them
  • Step-by-step recipes give you everything you need to get developing with Xamarin
  • Full of useful tips and best practices on creating iOS applications

Book Description

This book will...

The DevOps 2.0 Toolkit: Automating the Continuous Deployment Pipeline with Containerized Microservices
The DevOps 2.0 Toolkit: Automating the Continuous Deployment Pipeline with Containerized Microservices

This book is about different techniques that help us architect software in a better and more efficient way with microservices packed as immutable containers, tested and deployed continuously to servers that are automatically provisioned with configuration management tools. It's about fast, reliable and continuous deployments with...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

High Performance Computing on Vector Systems 2007
High Performance Computing on Vector Systems 2007
The book presents the state-of-the-art in high performance computing and simulation on modern supercomputer architectures. It covers trends in hardware and software development in general and specifically the future of vector-based systems and heterogeneous architectures. The application contributions cover computational fluid dynamics,...
The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine
The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine

Before digital computers ever existed, Alan Turing envisioned their power and versatility...but also proved what computers could never do.

In an extraordinary and ultimately tragic life that unfolded like a novel, Turing helped break the German Enigma code to turn the tide of World War II, later speculated on...

Software Performance and Scalability: A Quantitative Approach
Software Performance and Scalability: A Quantitative Approach

Praise from the Reviewers:

"The practicality of the subject in a real-world situation distinguishes this book from others available on the market."
Professor Behrouz Far, University of Calgary

"This book could replace the computer organization texts now in use that every CS and CpE...

Mac OS X Snow Leopard Server For Dummies
Mac OS X Snow Leopard Server For Dummies

Making Everything Easier!

Mac OS® X Snow Leopard Server for Dummies

Learn to:

  • Set up and configure a Mac network with Snow Leopard Server

  • Administer, secure, and troubleshoot the network

  • Incorporate a Mac subnet into a Windows Active...

LabVIEW Graphical Programming Cookbook
LabVIEW Graphical Programming Cookbook

For advanced LabVIEW users, this book is packed with practical recipes designed to immerse you in graphical programming, covering everything from animation creation to working with external applications.

Overview

  • Learn how to manage data flow
  • Demonstrate common coding practices
  • ...
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition

Delve into neural networks, implement deep learning algorithms, and explore layers of data abstraction with the help of TensorFlow.

Key Features

  • Learn how to implement advanced techniques in deep learning with Google's brainchild, TensorFlow
  • Explore deep neural...
unlimited object storage image
Result Page: 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy