 |
|
|
|
 Beautiful Code: Leading Programmers Explain How They Think (Theory in Practice)How do the experts solve difficult problems in software development? In this unique and insightful book, leading computer scientists offer case studies that reveal how they found unusual, carefully designed solutions to high-profile projects. You will be able to look over the shoulder of major coding and design experts to see problems through their... |  |  Water Quality & Treatment: A Handbook on Drinking Water
This sixth edition of Water Quality & Treatment: A Handbook on Drinking Water serves as a handbook for scientists, engineers, and other professionals who study and work in drinking water—particularly the quality of water supplies, the quality of treated drinking water, and water treatment processes. It is meant as a resource for... |  |  How to Plan, Contract and Build Your Own HomeThe Classic Blueprint for Do-It-Yourself Homebuilders Updated to Reflect the Latest Materials, Techniques, and Options!
Covering everything from hiring the right vendors to choosing fixtures, this information-packed guide is a step-by-step roadmap for building a new home or remodeling an existing one. The heavily-revised Fourth Edition... |
|
 IP LocationIn today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,... |  |  |  |  UML DemystifiedThere’s no easier, faster, or more practical way to learn the really tough subjects
UML Demystified explains how to read, model, and use UML to create well-structured, stable software products. This self-teaching guide comes complete with key points, background information, quizzes at the end of each chapter,... |
|
|
 Extreme Exploits: Advanced Defenses Against Hardcore HacksProtect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses... |  |  Discrete Mathematics and its Applications
Discrete Mathematics and its Applications is a focused introduction to the primary themes in a discrete mathematics course, as introduced through extensive applications, expansive discussion, and detailed exercise sets. These themes include mathematical reasoning, combinatorial analysis, discrete structures, algorithmic thinking, and enhanced... |  |  Discrete Mathematics and Its Applications
Discrete Mathematics and its Applications, Seventh Edition, is intended for one- or two-term introductory discrete mathematics courses taken by students from a wide variety of majors, including computer science, mathematics, and engineering. This renowned best-selling text, which has been used at over 500 institutions around the world,... |
|
|
Result Page: 126 125 124 123 122 121 120 119 118 117 |