Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python All-in-One For Dummies
Python All-in-One For Dummies

The one-stop resource for all your Python queries

Powerful and flexible, Python is one of the most popular programming languages in the world. It's got all the right stuff for the software driving the cutting-edge of the development world?machine learning, robotics, artificial intelligence, data science, etc....

C# Game Programming Cookbook for Unity 3D
C# Game Programming Cookbook for Unity 3D

This second edition of C# Game Programming Cookbook for Unity 3D expounds upon the first with more details and techniques. With a fresh array of chapters, updated C# code and examples, Jeff W. Murray’s book will help the reader understand structured game development in Unity unlike ever before.

New to this...

Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition
Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition

Create a fault-tolerant backend for your real-time applications using Docker, Node.js 10, and MongoDB, and implement HTTPS for hardened security

Key Features

  • Learn server-side programming with JavaScript and Node.js 10
  • Explore the latest JavaScript features and ECMAScript...
Beginning Entity Framework Core 5: From Novice to Professional
Beginning Entity Framework Core 5: From Novice to Professional
Eric Vogel

is a seasoned contributor to Visual Studio Magazine and Senior Software Developer at Red Cedar Solutions Group. He has been developing .NET Framework web and desktop solutions for 13 years. He holds a Bachelor of Science degree in computer science from Michigan State University. He is Acting
...
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Manage Your Project Portfolio: Increase Your Capacity and Finish More Projects
Manage Your Project Portfolio: Increase Your Capacity and Finish More Projects

You have too many projects, and firefighting and multitasking are keeping you from finishing any of them. You need to manage your project portfolio. This fully updated and expanded bestseller arms you with agile and lean ways to collect all your work and decide which projects you should do first, second, and never. See how to tie your work to...

Android Application Development Cookbook - Second Edition
Android Application Development Cookbook - Second Edition

Over 100 recipes to help you solve the most common problems faced by Android Developers today

About This Book

  • Find the answers to your common Android programming problems, from set up to security, to help you deliver better applications, faster
  • Uncover the latest features of Android...
Google Visualization API Essentials
Google Visualization API Essentials

Make sense of your data: make it visual with the Google Visualization API

Overview

  • Wrangle all sorts of data into a visual format, without being an expert programmer.
  • Visualize new or existing spreadsheet data through charts, graphs, and maps.
  • Full of diagrams, core concept...
Get Good with Money: Ten Simple Steps to Becoming Financially Whole
Get Good with Money: Ten Simple Steps to Becoming Financially Whole
NEW YORK TIMES, WALL STREET JOURNAL, AND USA TODAY BESTSELLER • A ten-step plan for finding peace, safety, and harmony with your money—no matter how big or small your goals and no matter how rocky the market might be—by the inspiring and savvy “Budgetnista.”

...
Unix Unleashed: Internet Edition
Unix Unleashed: Internet Edition
The first edition of Unix Unleashed provided a thick, comprehensive guide to the basic tools of the Unix trade, covering everything from system administration to the windowing system to the compiler environments. The guide also featured information on other tools, such as the vi editor, the command shells, the AWK, PERL, C and C++...
Lucid Waking: The Answer to the Problem of Consciousness
Lucid Waking: The Answer to the Problem of Consciousness
There is no problem more baffling to the academic world than the problem of consciousness. It’s fair to say that no academic has any clue at all about what consciousness is. In fact, academics have totally confused it with something radically different, namely sentience. The problem that faces the academic world is the insurmountable one...
unlimited object storage image
Result Page: 861 860 859 858 857 856 855 854 853 852 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy