Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger

Implement decentralized blockchain applications to build scalable Dapps

Key Features

  • Understand the blockchain ecosystem and its terminologies
  • Implement smart contracts, wallets, and consensus protocols
  • Design and develop decentralized applications using...
PMP Exam Prep, Eighth Edition - Updated: Rita's Course in a Book for Passing the PMP Exam
PMP Exam Prep, Eighth Edition - Updated: Rita's Course in a Book for Passing the PMP Exam

This book has been FULLY updated to reflect PMI's changes to the PMP Exam Content Outline dated June 2015, and is intended for all PMP exams taken AFTER November 1st, 2015. If you are taking the PMP exam on or before November 1st of 2015, please contact the Publisher.

Can you imagine valuing a book so much that you...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

Solaris 8: The Complete Reference
Solaris 8: The Complete Reference
Clients often ask why we choose Solaris as an operating environment. Is it a decision based on price? Is it an attraction to the latest gizmo features, each with its own four-letter acronym? Do we have a cozy arrangement with Sun Microsystems to promote their operating system? The answer to each of these questions is no, no, NO!  ...
Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)
Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)

Change: It’s what we expect from technology, from the PC to the web, through to HD TV. But nothing has been as disruptive as the change the iPhone and Android phones have brought. For the first time the power of a computer will fit in your hand, you are always connected to the Internet, and these devices are loaded with...

Early Christian Reader
Early Christian Reader

Early Christian Reader is a sourcebook and textbook that offers a welcoming and informed entrée into the complex world of the earliest Christian literature. The books of the New Testament (NRSV) are presented in a plausible chronological order rather than the canonical order encountered in modern New Testaments. In addition,...

The New Commodity Trading Guide: Breakthrough Strategies for Capturing Market Profits
The New Commodity Trading Guide: Breakthrough Strategies for Capturing Market Profits

“I’ve been trading stocks and commodities for more than 30 years, and I’ve read any number of how-to books, but George Kleinman’s The New Commodity Trading Guide is as clear, precise, and useful as any book I’ve come across during my career. I cannot recommend it strongly enough, if...

Data Compression: The Complete Reference
Data Compression: The Complete Reference
Giambattista della Porta, a Renaissance scientist, was the author in 1558 of Magia Naturalis (Natural Magic), a book in which he discusses many subjects, including demonology, magnetism, and the camera obscura. The book mentions an imaginary device that has since become known as the “sympathetic telegraph.” This device was to have...
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1

The TITLE of Volume 4 is Combinatorial Algorithms, and when I proposed it I was strongly inclined to add a subtitle: The Kind of Programming I Like Best. Mv editors have decided to tone down such exuberance, but the fact remains that programs with a combinatorial flavor have always been my favorites.

On the other hand I've...

Excel Gurus Gone Wild: Do the IMPOSSIBLE with Microsoft Excel
Excel Gurus Gone Wild: Do the IMPOSSIBLE with Microsoft Excel
Drawn from actual excel conundrums posted on the author's website, www.mrexcel.com, this high-level resource is designed for people who want to stretch Excel to its limits. Tips for solving 100 incredibly difficult problems are covered in depth and include extracting the first letter of each word in a paragraph, validating...
Reconstruction Era: Almanac Edition 1. (U X L Reconstruction Era Reference Library)
Reconstruction Era: Almanac Edition 1. (U X L Reconstruction Era Reference Library)
Doody Enterprises : "One insert box in this volume contains a "Letter from a Former Slave" that appeared in a Cincinnati newspaper on Aug. 7, 1865. It would be interesting to have students consider if this is a real letter dictated by a former slave or the creation of a journalist trying to sell newspapers who may have...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy