Home | Amazing | Today | Tags | Publishers | Years | Search 
Structure and Interpretation of Computer Programs, Second Edition
Structure and Interpretation of Computer Programs, Second Edition

With an analytical and rigorous approach to problem solving and programming techniques, this book is oriented toward engineering. Structure and Interpretation of Computer Programs emphasizes the central role played by different approaches to dealing with time in computational models. Its unique approach makes it appropriate for an...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Hacking Exposed 7: Network Security Secrets and Solutions
Hacking Exposed 7: Network Security Secrets and Solutions

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...

Sonography in Obstetrics & Gynecology: Principles and Practice
Sonography in Obstetrics & Gynecology: Principles and Practice

Current for today's physician, the new sixth edition features more than 2000 superperbly reproduced illustrations covering the spectrum of disorders and conditions seen in gynecologic and maternal-fetal care. Check out these areas of exciting NEW coverage:

Screening in early pregnancy: ultrasound of nuchal translucency
...

Current Diagnosis & Treatment in Psychiatry
Current Diagnosis & Treatment in Psychiatry

A convenient, up-to-date, time-saving reference for the diagnosis, psychopharmacologic treatment, and psychotherapeutic management of the full range of psychiatric disorders. Includes a highly useful separate section devoted to psychiatric disorders occurring in infancy, childhood, and adolescence. Extensive Index and detailed Table of...

Programming the Raspberry Pi, Second Edition: Getting Started with Python
Programming the Raspberry Pi, Second Edition: Getting Started with Python

An updated guide to programming your own Raspberry Pi projects

Learn to create inventive programs and fun games on your powerful Raspberry Pi―with no programming experience required. This practical book has been revised to fully cover the new Raspberry Pi 2, including upgrades to the Raspbian operating system. Discover...
MySQL and JSON: A Practical Programming Guide
MySQL and JSON: A Practical Programming Guide
Practical instruction on using JavaScript Object Notation (JSON) with MySQL


This hands-on guide teaches, step by step, how to use JavaScript Object Notation (JSON) with MySQL. Written by a MySQL Community Manager for Oracle, MySQL and JSON: A Practical Programming Guide...
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
Database Management Systems, 3rd Edition
Database Management Systems, 3rd Edition

Database Management Systems provides comprehensive and up-to-date coverage of the fundamentals of database systems. Coherent explanations and practical examples have made this one of the leading texts in the field. The third edition continues in this tradition, enhancing it with more practical material.

The new edition has...

Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

Power Programming With Mathematica: The Kernel (Programming Tools for Scientists & Engineers)
Power Programming With Mathematica: The Kernel (Programming Tools for Scientists & Engineers)

Power Programming with Mathematica: The Kernel offers you a self-contained overview of this high-level language, featuring real-world programming tips and techniques - plus an accompanying disk with an array of advanced programming examples, utilities, and supported exercises.

Filled with programming-related examples and...

E-Habits: What You Must Do to Optimize Your Professional Digital Presence
E-Habits: What You Must Do to Optimize Your Professional Digital Presence

What Does the Digital You Look Like?

What you read • Where you shop • How you communicate with coworkers, friends, and strangers • Whom you interact with on social networking sites . . . these are just a few of the things that make up the Digital You.

"The Digital You is a complex mosaic of...

Result Page: 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy