Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Building on the success of its storefront and fulfillment services, Amazon now allows businesses to "rent" computing power, data storage and bandwidth on its vast network platform. This book demonstrates how developers working with small- to mid-sized companies can take advantage of Amazon Web Services (AWS) such as the Simple Storage...
Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Head First Design Patterns
Head First Design Patterns

You're not alone. At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don't want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns--the lessons learned by those who've faced the same problems. With Design Patterns, you get to take...

Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Computer Privacy Annoyances
Computer Privacy Annoyances

From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances...

Van Halen: Exuberant California, Zen Rock'n'roll (Reverb)
Van Halen: Exuberant California, Zen Rock'n'roll (Reverb)

Van Halen are known for classic songs like “Runnin’ with the Devil,” "Panama,” and “Jump,” but also for the drama surrounding the exits of its former members. While many have attempted to discover the secrets of Van Halen through an analysis of their musical role models, John Scanlan looks at...

Programming Amazon EC2
Programming Amazon EC2

Thank you for picking up a copy of this book. Amazon Web Services (AWS) has amazed everyone: Amazon has made lots of friends, and all its “enemies” are too busy admiring AWS to do much fighting back. At the moment, there is no comparable public Infrastructure as a Service (IaaS); AWS offers the services at a scale that has...

The BIOS Companion: The book that doesn't come with your motherboard!
The BIOS Companion: The book that doesn't come with your motherboard!
The instructions that turn a PC into a useful machine come in three stages, starting with application programs, which are loaded by an operating system, which in turn is loaded by a bootstrap loader in the BIOS (the Basic Input/Output System). There are several in a PC, a good example being the one on the video card that controls the interface...
Street Photography: The Art of Capturing the Candid Moment
Street Photography: The Art of Capturing the Candid Moment

Since the advent of the camera, there have been photographers whose mission is to record and interpret the public sphere in all its aspects. Eugene Atget documented evidence of everyday life in the streets as well as the buildings and monuments of Paris. Henri Cartier-Bresson pursued what he called "The Decisive Moment," the moment...

Git Recipes: A Problem-Solution Approach
Git Recipes: A Problem-Solution Approach

The manufacturers of computer software are facing difficult challenges caused by quite trivial reasons. A typical  application is produced by a team of developers working on hundreds, if not thousands, of files on a short schedule. 

Each file needs to be available for modification by all of the developers at any
...

Handbook of Virtual Humans
Handbook of Virtual Humans
Virtual Humans simulations are becoming increasingly popular and many systems are now available to animate Virtual Humans. Such systems encompass several different domains including autonomous agents in virtual environments, human factors analysis, training, education, virtual prototyping, simulation–based design and entertainment.

At...

Clojure for the Brave and True: Learn the Ultimate Language and Become a Better Programmer
Clojure for the Brave and True: Learn the Ultimate Language and Become a Better Programmer

For weeks, months—nay!—from the very moment you were born, you’ve felt it calling to you. At long last you’ll be united with the programming language you’ve been longing for: Clojure!

As a Lisp-style functional programming language, Clojure lets you write robust and elegant code, and because it
...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy