Home | Amazing | Today | Tags | Publishers | Years | Search 
grep Pocket Reference
grep Pocket Reference
grep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket...
Cable Communications Technology
Cable Communications Technology
Cable is now as much in the broadband business as it is television. This book explains the fundamentals of coaxial cable technology and the DSP that controls it, along with the cable modem and voice over IP technology now drastically changing the cable operators’ business. Aimed at working engineers and technicians, it can also be used a...
Encyclopedia Of Haunted Places: Ghostly Locales From Around The World
Encyclopedia Of Haunted Places: Ghostly Locales From Around The World
The Encyclopedia of Haunted Places is the first directory to be written by dozens of the world's leading paranormal investigators. Research notes, location background, first-hand accounts, and many anomalous photographs featuring ghostly manifestations comprise the hundreds of haunted listings in this directory. For years, paranormal investigative...
Java Programming Language Handbook: The Ultimate Source for Conquering the Java Programming Language
Java Programming Language Handbook: The Ultimate Source for Conquering the Java Programming Language
Includes complete reference material on the entire Java language, from data types to Java classes. Provides detailed overview chapters that explain the art of the Internet and distributed programming with Java. Features special tips to help C/C++ programmers master Java. Includes special coverage of interfacing Java with other languages. Gives you...
Big Java
Big Java
No one brews up a better Java guide than Cay Horstmann and in this Third Edition of Big Java he's perfected his recipe. Thoroughly updated to include Java 6, the Third Edition of Horstmann's bestselling text helps you absorb computing concepts and programming principles, develop strong problem-solving skills, and become a better programmer, all...
Algorithm Design
Algorithm Design
Algorithm Design introduces algorithms by looking at the real-world problems that motivate them. The book teaches a range of design and analysis techniques for problems that arise in computing applications. The text encourages an understanding of the algorithm design process and an appreciation of the...
Beautiful Architecture: Leading Thinkers Reveal the Hidden Beauty in Software Design
Beautiful Architecture: Leading Thinkers Reveal the Hidden Beauty in Software Design
What are the ingredients of robust, elegant, flexible, and maintainable software architecture? Beautiful Architecture answers this question through a collection of intriguing essays from more than a dozen of today's leading software designers and architects. In each essay, contributors present a notable software architecture, and analyze...
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Every day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,...
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

...

Introductory Nuclear Physics
Introductory Nuclear Physics
In the half dozen years or so since the first publication of Introductory Nuclear Physics, there have been several new developments and changes in the emphasis in the field. This, together with the enthusiastic feedback from colleagues and students, makes it imperative to publish a new edition.

For an active topic of research, a textbook
...
Silverlight 2 Unleashed
Silverlight 2 Unleashed
Full Color Code samples appear as they do in Visual Studio and Expression Blend!

 

Printed entirely in color, with helpful figures and syntax coloring to make code samples appear as they do in Visual Studio and Expression Blend!

 

Result Page: 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 301 300 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy