Home | Amazing | Today | Tags | Publishers | Years | Search 
Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development
Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development

With the advent of version 2 of the iPhone system, Apple proved they could do a remarkable thing — adapt their existing Cocoa computer application programming framework to make applications for a touch-based device with limited memory and speed and a dauntingly tiny display. The resulting Cocoa Touch framework, in fact, turned...

Programming Reactive Extensions and LINQ
Programming Reactive Extensions and LINQ

Right now, we as programmers are at an impasse—a transition period between the well-understood world of imperative programming, and a world that is increasingly at odds with this model. In the ’80s, everything was simple: one machine, one thread, no network.

CPUs are now scaling horizontally, adding more and more...

Programming iOS 5: Fundamentals of iPhone, iPad, and iPod touch Development
Programming iOS 5: Fundamentals of iPhone, iPad, and iPod touch Development
With the advent of version 2 of the iPhone system, Apple proved they could do a remarkable thing — adapt their existing Cocoa computer application programming framework to make applications for a touch-based device with limited memory and speed and a dauntingly tiny display. The resulting Cocoa Touch framework, in...
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
One exciting aspect of software programming is that there are usually many ways to accomplish the same goal. Unfortunately, this also presents software engineers with unique challenges when trying to make the best design or implementation choice for each situation. Experience plays a major role, and the learning...
Chemical Mechanical Polishing in Silicon Processing, Volume 63
Chemical Mechanical Polishing in Silicon Processing, Volume 63
In the engineering world, many ideas and plans are conceived in the information exchanges that occur over lunch. In the summer of 1997, one of the editors (Shin Hwa Li) was assigned to assist our CMP module at the Crolles facility of STMicroelectronics near Grenoble, France. One day, in the company cafeteria, while sitting near...
Games Diversions & Perl Culture: Best of the Perl Journal
Games Diversions & Perl Culture: Best of the Perl Journal

This is the third of three “Best of The Perl Journal” O’Reilly books, containing the créme de la créme of the 247 articles published during The Perl Journal ’s five-year existence as a standalone magazine. This particular book contains 47 articles about the leisure pursuits of Perl programmers....

Chemical testing of textiles (Woodhead Publishing Series in Textiles)
Chemical testing of textiles (Woodhead Publishing Series in Textiles)
It has long been my desire to contribute to a textbook that is solely devoted to the chemical analysis of textiles. Thus, when Woodhead Publishing contacted me about editing this book, I enthusiastically accepted the offer. Now, with the hard work of a team of contributors who are professors, material researchers and textile analysts from...
Beyond Change Management: How to Achieve Breakthrough Results Through Conscious Change Leadership, Second Edition
Beyond Change Management: How to Achieve Breakthrough Results Through Conscious Change Leadership, Second Edition

"With this extensively upgraded second edition, Dean Anderson and Linda Ackerman Anderson solidify their status as the leading authorities on change leadership and organizational transformation. This is without question the most comprehensive approach for leaders who are serious about making change a strategic discipline."

...

Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Bulletproof your organization against data breach, identity theft, and corporate espionage

In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...

The $1 Million Reason to Change Your Mind
The $1 Million Reason to Change Your Mind

What is the $1 million reason to change your mind?

Change the way you think and you will change your world. Simple.

In this book Pat Mesiti will teach you how to shrug off the shackles of mediocrity, find your inner millionaire and think differently about life and money -- and get rich and happy along the way!

...
Your Best Just Got Better: Work Smarter, Think Bigger, Make More
Your Best Just Got Better: Work Smarter, Think Bigger, Make More

Imagine if your best just got better every single day

In Your Best Just Got Better, productivity expert Jason Womack teaches readers that working longer hours doesn't make up for a flawed approach to productivity and performance. Workers need to clarify their habits, build mindset-based strategies, and be...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy