Home | Amazing | Today | Tags | Publishers | Years | Search 
The Lost Boyz: A Dark Side of Graffiti
The Lost Boyz: A Dark Side of Graffiti

At age 14, author Justin Rollins went from being a bullied child to the leader of The Warriorz, a group of London street kids involved in graffiti tagging and other crimes, including a series of violent encounters. Eventually given a substantial custodial sentence for an attack with a meat cleaver in the London Underground, Rollins became...

Clean C++: Sustainable Software Development Patterns and Best Practices with C++ 17
Clean C++: Sustainable Software Development Patterns and Best Practices with C++ 17
Write maintainable, extensible, and durable software with modern C++. This book is a must for every developer, software architect, or team leader who is interested in good C++ code, and thus also wants to save development costs. If you want to teach yourself about writing clean C++, Clean C++ is exactly what you need. It is written...
The Evolution from Protein Chemistry to Proteomics: Basic Science to Clinical Application
The Evolution from Protein Chemistry to Proteomics: Basic Science to Clinical Application

Largely driven by major improvements in the analytical capability of mass spectrometry, proteomics is being applied to broader areas of experimental biology, ranging from oncology research to plant biology to environmental health. However, while it has already eclipsed solution protein chemistry as a discipline, it is still essentially an...

Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Design It!: From Programmer to Software Architect (The Pragmatic Programmers)
Design It!: From Programmer to Software Architect (The Pragmatic Programmers)

Don't engineer by coincidence-design it like you mean it! Filled with practical techniques, Design It! is the perfect introduction to software architecture for programmers who are ready to grow their design skills. Lead your team as a software architect, ask the right stakeholders the right questions, explore design options, and...

Scientific Computing with Python 3
Scientific Computing with Python 3

Key Features

  • Your ultimate resource for getting up and running with Python numerical computations
  • Explore numerical computing and mathematical libraries using Python 3.x code with SciPy and NumPy modules
  • A hands-on guide to implementing mathematics with Python, with complete...
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)

Learn, prepare, and practice for CCNA Cyber Ops SECOPS #210-255 exam success with this Official Cert Guide from Pearson IT Certification, a leader in IT Certification learning.

  • Master CCNA Cyber Ops SECOPS #210-255 exam topics
Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

Power Phone Scripts: 500 Word-for-Word Questions, Phrases, and Conversations to Open and Close More Sales
Power Phone Scripts: 500 Word-for-Word Questions, Phrases, and Conversations to Open and Close More Sales

Start closing sales like top producers!

Have you ever found yourself at a loss for what to say when the gatekeeper asks you what your call is about? Have your palms ever sweated when the decision maker shuts you down with: “I wouldn’t be interested”? Has your heart taken a fast dive into your stomach when,...

Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

RESTful Web API Design with Node.JS - Second Edition
RESTful Web API Design with Node.JS - Second Edition

Key Features

  • Create a fully featured RESTful API solution from scratch.
  • Learn how to leverage Node.JS, Express, MongoDB and NoSQL datastores to give an extra edge to your REST API design.
  • Use this practical guide to integrate MongoDB in your Node.js application.

Book...

Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy