Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Mathematica Book, Fifth Edition
The Mathematica Book, Fifth Edition

As both a highly readable tutorial and a definitive reference for over a million Mathematica users worldwide, this book covers every aspect of Mathematica. It is an essential resource for all users of Mathematica from beginners to experts. This expanded fifth edition presents Mathematica Version 5 for the first time and is important for...

Magento 2 Development Essentials
Magento 2 Development Essentials

Key Features

  • Create unique solutions for Magento 2 by developing and implementing solutions, themes, and extensions
  • Be proficient in the main functionalities, resources, and system structure of Magento 2
  • Get to grips with this practical and hands-on guide to raise your web development skills...
Flash MX Savvy (With CD-ROM)
Flash MX Savvy (With CD-ROM)
Anticipates your goals and uses professional examples to show you the best ways to attain them. Hands-on tutorials allows you to apply different techniques to projects that will yield useful, real-world results. Softcover. CD-ROM included.

This is the first book in our Savvy series, a new line of premium quality, in-depth
...
Programming Erlang: Software for a Concurrent World
Programming Erlang: Software for a Concurrent World
Erlang solves one of the most pressing problems facing developers today: how to write reliable, concurrent, high-performance systems. It's used worldwide by companies who need to produce reliable, efficient, and scalable applications. Invest in learning Erlang now.

Moore's Law is the observation that the amount you can do on a single chip...

Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Algorithmic Cryptanalysis (Cryptography and Network Security)
Algorithmic Cryptanalysis (Cryptography and Network Security)
Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox,...
Murach's HTML, XHTML, and CSS (Web Programming)
Murach's HTML, XHTML, and CSS (Web Programming)

If you have anything to do with web development, you should know how to use HTML. XHTML, and CSS the modern, professional way. That's true if you want to become a web designer. That's true for web designers who still use tables for page layout when they should be using CSS. That's true for JavaScript programmers. And that's...

Introduction to Search with Sphinx: From installation to relevance tuning
Introduction to Search with Sphinx: From installation to relevance tuning

I can’t quite believe it, but just 10 years ago there was no Google.

Other web search engines were around back then, such as AltaVista, HotBot, Inktomi, and AllTheWeb, among others. So the stunningly swift ascendance of Google can settle in my mind, given some effort. But what’s even more unbelievable is that...

Thermal Comfort Assessment of Buildings (SpringerBriefs in Applied Sciences and Technology)
Thermal Comfort Assessment of Buildings (SpringerBriefs in Applied Sciences and Technology)

A number of metrics for assessing human thermal response to climatic conditions have been proposed in scientific literature over the last decades. They aim at describing human thermal perception of the thermal environment to which an individual or a group of people is exposed. More recently, a new type of “discomfort index” has...

Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...

Aptana Radrails: An Ide for Rails Development
Aptana Radrails: An Ide for Rails Development
Coming from a background of developing in languages such as Java, one of the things that surprised me the most about the Ruby and Rails community, was the common practice of not using an Integrated Development Environment. Most of the members of the community, including the most relevant, were comfortable with just a programmer's editor.
...
unlimited object storage image
Result Page: 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy