Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Murach's C++ 2008 (Murach: Training & Reference)
Murach's C++ 2008 (Murach: Training & Reference)

Finally, a great training and reference book for Visual C++ by Dr. Prentiss Knowlton, an instructor of C++ since its inception. This book helps you master C++ 2008 quickly and easily by using all the time- and work-saving features of Visual Studio. That's true whether you're a:

  • Java developer who wants to learn...
Network Security Through Data Analysis: Building Situational Awareness
Network Security Through Data Analysis: Building Situational Awareness

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what...

Matplotlib Plotting Cookbook
Matplotlib Plotting Cookbook

This book follows a cookbook style approach that puts orthogonal and non-redundant recipes in your hands. Rather than rehashing the user manual, the explanations expose the underlying logic behind Matplotlib.

If you are an engineer or scientist who wants to create great visualizations with Python, rather than yet another
...

REST API Design Rulebook
REST API Design Rulebook

In today’s market, where rival web services compete for attention, a well-designed REST API is a must-have feature. This concise book presents a set of API design rules, drawn primarily from best practices that stick close to the Web’s REST architectural style. Along with rules for URI design and HTTP use, you’ll...

C++ Without Fear: A Beginner's Guide That Makes You Feel Smart
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart

If you’ve always wanted to learn how to program a computer, or to learn the widely used C++ programming language in particular, C++ Without Fear, Second Edition, offers...

Build Android-Based Smart Applications: Using Rules Engines, NLP and Automation Frameworks
Build Android-Based Smart Applications: Using Rules Engines, NLP and Automation Frameworks
Build smart applications using cutting-edge technologies such as rules engines, code automation frameworks, and natural language processing (NLP). This book provides step-by-step instructions on how to port nine rules engines (CLIPS, JRuleEngine, DTRules, Zilonis, TermWare, Roolie, OpenRules, JxBRE, and JEOPS) to the Android...
Discrete Mathematics With Algorithms
Discrete Mathematics With Algorithms
This first-year course in discrete mathematics requires no calculus or computer programming experience. The approach stresses finding efficient algorithms, rather than existential results. Provides an introduction to constructing proofs (especially by induction), and an introduction to algorithmic problem-solving. All algorithms are presented in...
Microsoft Visual J# .NET (Core Reference)
Microsoft Visual J# .NET (Core Reference)

Java-language developers—learn how to create .NET applications with the Microsoft development tool for you: Visual J# .NET.

Leverage your Java skills and learn how to create powerful Microsoft Windows® applications and high-performance, distributed applications with Visual J# .NET in this...

Image Processing and Jump Regression Analysis (Wiley Series in Probability and Statistics)
Image Processing and Jump Regression Analysis (Wiley Series in Probability and Statistics)
The first text to bridge the gap between image processing and jump regression analysis

Recent statistical tools developed to estimate jump curves and surfaces have broad applications, specifically in the area of image processing. Often, significant differences in technical terminologies make communication between the disciplines of image...

Computer-Aided Intelligent Recognition Techniques and Applications
Computer-Aided Intelligent Recognition Techniques and Applications
Intelligent recognition methods have recently proven to be indispensable in a variety of modern industries, including computer vision, robotics, medical imaging, visualization and the media. Furthermore, they play a critical role in the traditional fields such as character recognition, natural language processing and personal identification.

...

Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications
Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications

Proven techniques and patterns for enterprise development.

  • Design guidelines for EJB 2.0 component architecture
  • Powerful patterns for enterprise application design
  • Extensive real-world code examples
  • Covers every type of component, including message-driven beans

This...

unlimited object storage image
Result Page: 454 453 452 451 450 449 448 447 446 445 444 443 442 441 440 439 438 437 436 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy