Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Professional Python Frameworks: Web 2.0 Programming with Django and Turbogears (Programmer to Programmer)
Professional Python Frameworks: Web 2.0 Programming with Django and Turbogears (Programmer to Programmer)
As two of the leading MVC web frameworks for Python, Django and TurboGears allow you to develop and launch sites in a fraction of the time compared to traditional techniques and they provide greater stability, scalability, and management than alternatives. Packed with examples, this book will help you discover a new methodology for designing,...
An Implementation Guide to Compiler Writing
An Implementation Guide to Compiler Writing

An important aspect of teaching a course in compiler writing is to illustrate the key theoretical concepts normally taught in such a course. A frequently used strategy for achieving this goal is to have a student design a simple programming language and implement a compiler for this language. Many texts in compiler writing do not,...

Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

Pharmaceutical Data Mining: Approaches and Applications for Drug Discovery
Pharmaceutical Data Mining: Approaches and Applications for Drug Discovery

Leading experts illustrate how sophisticated computational data mining techniques can impact contemporary drug discovery and development

In the era of post-genomic drug development, extracting and applying knowledge from chemical, biological, and clinical data is one of the greatest challenges facing the pharmaceutical industry....

Managing Information Security Risks: The OCTAVE Approach
Managing Information Security Risks: The OCTAVE Approach

Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluation of security needs and...

Building Microservices with Go
Building Microservices with Go

Key Features

  • This short, concise, and practical guide is packed with real-world examples of building microservices with Go
  • It is easy to read and will benefit smaller teams who want to extend the functionality of their existing systems
  • Using this practical approach will save your money in...
UNIX System Programming for System VR4 (Nutshell Handbooks)
UNIX System Programming for System VR4 (Nutshell Handbooks)

Any program worth its salt uses operating system services. Even a simple program, if practical, reads input and produces output. And, most applications have more complex needs. They need to find out the time, use the network, or start and communicate with other processes. Systems programming really means nothing more than writing...

Data Structures and Algorithms with Object-Oriented Design Patterns in Java
Data Structures and Algorithms with Object-Oriented Design Patterns in Java
Create sound software designs with data structures that use modern object-oriented design patterns! Author Bruno Preiss presents the fundamentals of data structures and algorithms from a modern, object-oriented perspective. The text promotes object-oriented design using Java and illustrates the use of the latest object-oriented design patterns....
XPath Essentials
XPath Essentials
This book is a learn-by-doing book. It is for anybody who needs to start using XPath today. Throughout the chapters of this book, you will be shown example after example of working code that uses XPath. As you work through the text and the examples, I think you will find code that you can adapt or extend to your own needs and purposes. Because the...
Designing Visual Interfaces: Communication Oriented Techniques
Designing Visual Interfaces: Communication Oriented Techniques
An excellent introduction to the design theories involved in the creation of user interfaces. Instead of the usual examples and pictures of computer screens and application menus, Mullet approaches the concept of UI from its "outside world" roots. With examples ranging from street signs to corporate logos to the map of the London...
Exploratory Multivariate Analysis by Example Using R (Chapman & Hall/CRC Computer Science & Data Analysis)
Exploratory Multivariate Analysis by Example Using R (Chapman & Hall/CRC Computer Science & Data Analysis)

Full of real-world case studies and practical advice, Exploratory Multivariate Analysis by Example Using R focuses on four fundamental methods of multivariate exploratory data analysis that are most suitable for applications. It covers principal component analysis (PCA) when variables are quantitative, correspondence analysis...

Agile Model-Based Development Using UML-RSDS
Agile Model-Based Development Using UML-RSDS

This book describes the concepts and application of model-based development (MBD), model transformations, and Agile MBD to a wide range of software systems. It covers systems requirements engineering, system specification and design, verification, reuse, and system composition in the context of Agile MBD. Examples of applications in...

Result Page: 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy