Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Structures and Algorithms (Software Engineering and Knowledge Engineering, 13)
Data Structures and Algorithms (Software Engineering and Knowledge Engineering, 13)

This is an excellent, up-to-date and easy-to-use text on data structures and algorithms that is intended for undergraduates in computer science and information science. The thirteen chapters, written by an international group of experienced teachers, cover the fundamental concepts of algorithms and most of the important data structures as...

Communicating Mathematics in the Digital Era
Communicating Mathematics in the Digital Era

The digital era has dramatically changed the ways that researchers search, produce, publish, and disseminate their scientific work. These processes are still rapidly evolving due to improvements in information science, new achievements in computer science technologies, and initiatives such as DML and open access journals, digitization...

HTML5: The Missing Manual (Missing Manuals)
HTML5: The Missing Manual (Missing Manuals)

HTML5 is more than a markup language—it’s a collection of several independent web standards. Fortunately, this expanded guide covers everything you need in one convenient place. With step-by-step tutorials and real-world examples, HTML5: The Missing Manual shows you how to build web apps that include video tools,...

iOS 8 Swift Programming Cookbook: Solutions & Examples for iOS Apps
iOS 8 Swift Programming Cookbook: Solutions & Examples for iOS Apps

Entirely rewritten for Apple’s Swift programming language, this updated cookbook helps you overcome the vexing issues you’re likely to face when creating apps for iOS devices.

You’ll find hundreds of new and revised recipes for using the iOS 8 SDK, including techniques for working with Health data and...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Food Irradiation Research and Technology
Food Irradiation Research and Technology

The benefits of food irradiation to the public health have been described extensively by organizations such as the Centers for Disease Control and Prevention in the USA and the World Health Organization. The American Medical Association and the American Dietetic Association have both endorsed the irradiation process. Yet the potential health...

Breast Cancer: Nuclear Medicine in Diagnosis and Therapeutic Options
Breast Cancer: Nuclear Medicine in Diagnosis and Therapeutic Options

There can never be enough material in the public domain about cancers, and particularly breast cancer. This book adds much to the literature. It provides general information on breast cancer management and considers all new methods of diagnosis and therapy. It focuses on nuclear medicine modalities by comparing their results with other...

Organise Yourself: Clear the Clutter; Take Charge of Your Time; Manage Information (Sunday Times Creating Success)
Organise Yourself: Clear the Clutter; Take Charge of Your Time; Manage Information (Sunday Times Creating Success)

Many people find it hard to get on top of their workload.  They constantly bounce from one task to another and struggle to prioritize, which can have a serious impact on productivity.

Organise Yourself helps readers develop effective organizational skills and dramatically improve the way they work. It...

Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists
Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists

Bring your electronic inventions to life!

"This full-color book is impressive...there are some really fun projects!" -GeekDad, Wired.com

Who needs an electrical engineering degree? This intuitive guide shows how to wire, disassemble, tweak, and re-purpose everyday devices quickly and easily. Packed with...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Modern C Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library
Modern C Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library

Discover how C's efficiency makes it a popular choice in a wide variety of applications and operating systems with special applicability to wearables, game programming, system level programming, embedded device/firmware programming and in Arduino and related electronics hobbies in this condensed code and syntax guide. This book...

Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...

unlimited object storage image
Result Page: 924 923 922 921 920 919 918 917 916 915 914 913 912 911 910 909 908 907 906 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy