Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical OCaml
Practical OCaml

Objective Caml (OCaml) is an open source programming language that allows you to utilize both functional and object-oriented programming. Sporting features such as a robust object system, type safety, and an expansive standard library, OCaml is a language that encourages pragmatic solutions instead of dogmatic ones. Boasting performance on par...

Handbook of Algorithms for Wireless Networking and Mobile Computing
Handbook of Algorithms for Wireless Networking and Mobile Computing

Handbook of Algorithms for Wireless Networking and Mobile Computing focuses on several aspects of mobile computing, particularly algorithmic methods and distributed computing with mobile communications capability. This volume provides the topics that are crucial for building the foundation for the design and construction of future generations of...

MCTS Self-Paced Training Kit (Exam 70-431): Microsoft  SQL Server(TM) 2005 Implementation and Maintenance
MCTS Self-Paced Training Kit (Exam 70-431): Microsoft SQL Server(TM) 2005 Implementation and Maintenance

Announcing an all-new MCTS Training Kit designed to help maximize your performance on Exam 70-431, a core exam for the new Microsoft IT Professional certifications. This kit packs the tools and features wanted mostincluding in-depth, self-paced training based on final exam content; rigorous, objective-by-objective review; exam tips from...

Service Oriented Architecture For Dummies (Computer/Tech)
Service Oriented Architecture For Dummies (Computer/Tech)
Welcome to Service Oriented Architecture (SOA) For Dummies. We are very excited by this topic and hope our enthusiasm is contagious. We believe SOA is the most important technology initiative facing businesses today. SOA is game changing, and early SOA successes make it clear that SOA is here to stay. We hope this book is enough
...
Simulating Continuous Fuzzy Systems (Studies in Fuzziness and Soft Computing)
Simulating Continuous Fuzzy Systems (Studies in Fuzziness and Soft Computing)
This book is the companion text to Simulating Fuzzy Systems which investigated discrete fuzzy systems through crisp discrete simulation. The current book studies continuous fuzzy dynamical systems using crisp continuous simulation. We start with a crisp continuous dynamical system whose evolution depends on a system of ordinary differential...
Developer's Guide to Web Application Security
Developer's Guide to Web Application Security
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.

This book defines Web application security, why it should be
...
Professional XML (Programmer to Programmer): 2nd Edition
Professional XML (Programmer to Programmer): 2nd Edition
Professional XML is aimed toward seasoned Web or general application developers as a guide for developing sophisticated, real-world XML solutions. It successfully meets the most pressing need for programmers new to XML by putting all of the various component technologies into clear context.

The near boundless potential of XML also...

CISCO TCP/IP Routing Professional Reference, Revised and Expanded
CISCO TCP/IP Routing Professional Reference, Revised and Expanded
An absolute gem of a reference guide, Cisco TCP/IP Routing Professional Reference brings the empyreal realm of routers and protocols solidly to earth. The author provides excellent analogies coupled with practical tips, making this book suitable for those new to the strange terrain of Cisco routers and TCP/IP networking as well as for the...
Hacking For Dummies (Computer/Tech)
Hacking For Dummies (Computer/Tech)
Welcome to Hacking For Dummies, 2nd Edition. This book outlines — in plain English — computer hacker tricks and techniques that you can use to assess the security of your own information systems, find security vulnerabilities, and fix the weaknesses before criminal hackers and rogue insiders have an opportunity to take advantage of...
Code Generation in Action
Code Generation in Action
Developers using code generation are producing higher quality code faster than their hand-coding counterparts. And, they enjoy other advantages like maintainability, consistency and abstraction. Using the new CG methods they can make a change in one place, avoiding multiple synchronized changes you must make by hand.

Code Generation in...

Machine Learning and Data Mining for Computer Security: Methods and Applications
Machine Learning and Data Mining for Computer Security: Methods and Applications

"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security.

The first part of the...

Object Solutions: Managing the Object-Oriented Project (OBT)
Object Solutions: Managing the Object-Oriented Project (OBT)
Early adopters of object-oriented technology took it on faith that object orientation
was A Good Thing, offering hope for improving some ugly aspect of software
development. Some of these primordial efforts truly flourished, some
failed, but overall, a number of such projects quietly began to experience the
anticipated benefits
...
Result Page: 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy