Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Science of Chocolate
The Science of Chocolate

The second edition of this international best seller has been fully revised and updated describing the complete chocolate making process, from the growing of the beans to the sale in the shops. The Science of Chocolate takes the reader on the journey of chocolate, to discover how confectionery is made and the way in which basic science plays...

Django Design Patterns and Best Practices
Django Design Patterns and Best Practices

Easily build maintainable websites with powerful and relevant Django design patterns

About This Book

  • Unravel the common problems of web development in Django
  • Learn the current best practices while working in Django 1.7 and Python 3.4
  • Experience the challenges of working on...
IFRS 9 and CECL Credit Risk Modelling and Validation: A Practical Guide with Examples Worked in R and SAS
IFRS 9 and CECL Credit Risk Modelling and Validation: A Practical Guide with Examples Worked in R and SAS

IFRS 9 and CECL Credit Risk Modelling and Validation covers a hot topic in risk management. Both IFRS 9 and CECL accounting standards require Banks to adopt a new perspective in assessing Expected Credit Losses. The book explores a wide range of models and corresponding validation procedures. The most traditional regression...

Managing for Knowledge - HR's Strategic Role
Managing for Knowledge - HR's Strategic Role

This practical book draws on the author’s own experience, as well as that of leading-edge Human Resource and Knowledge Management practitioners including Linda Holbeche, Elizabeth Lank and Dave Snowden, each of whom recognizes, that building a knowledge-centric culture cannot be achieved through technology alone.

It covers areas...

Instant SymPy Starter
Instant SymPy Starter

Symbolic computation is the use of algorithms and software to perform exact calculations on symbolic mathematical expressions. It has traditionally been the preserve of monolithic computer algebra systems. SymPy puts its power within easy reach of all Python programmers, just an import statement away.

Instant SymPy Starter is an...

Learning Metasploit Exploitation and Development
Learning Metasploit Exploitation and Development

Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security...

Realm of Racket: Learn to Program, One Game at a Time!
Realm of Racket: Learn to Program, One Game at a Time!

Racket is a descendant of Lisp, a programming language renowned for its elegance, power, and challenging learning curve. But while Racket retains the functional goodness of Lisp, it was designed with beginning programmers in mind. Realm of Racket is your introduction to the Racket language.

In Realm of...

Future-Proof Web Design
Future-Proof Web Design

Best practices for flexible design that meet common challenges

The web is constantly changing and evolving with an increased range of devices, browsers, and standards that need to be considered in design. Web designers know they must stay sharp in order to keep up with the rapid pace of technology change. This much-needed...

GNS3 Network Simulation Guide
GNS3 Network Simulation Guide

Acquire a comprehensive knowledge of the GNS3 graphical network simulator, using it to prototype your network without the need for physical routers

Overview

  • Develop your knowledge for Cisco certification (CCNA, CCNP, CCIE), using GNS3
  • Install GNS3 successfully on Windows, Linux, or OS...
Java EE 8 and Angular: A practical guide to building modern single-page applications with Angular and Java EE
Java EE 8 and Angular: A practical guide to building modern single-page applications with Angular and Java EE

Learn how to build high-performing enterprise applications using Java EE powered by Angular at the frontend

Key Features

  • Leverage Java EE 8 features to build robust back end for your enterprise applications
  • Use Angular to build a single page frontend and combine it with...
OpenGL(R) ES 2.0 Programming Guide
OpenGL(R) ES 2.0 Programming Guide
Over the years, the “Red Book” has become the authoritative reference for each new version of the OpenGL API. Now we have the “Gold Book” for OpenGL ES 2.0—a cross-platform open standard ushering in a new era of shader programmability and visual sophistication for a wide variety of embedded and mobile devices, from...
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

unlimited object storage image
Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy