Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Effective Programming: More Than Writing Code
Effective Programming: More Than Writing Code

ABOUT THE BOOK Jeff Atwood began the Coding Horror blog in 2004, and is convinced that it changed his life. He needed a way to keep track of software development over time - whatever he was thinking about or working on. He researched subjects he found interesting, then documented his research with a public blog post, which he could easily...

Practical Programming: An Introduction to Computer Science Using Python 3 (Pragmatic Programmers)
Practical Programming: An Introduction to Computer Science Using Python 3 (Pragmatic Programmers)

This book is for anyone who wants to understand computer programming. You'll learn to program in a language that' s used in millions of smartphones, tablets, and PCs. You'll code along with the book, writing programs to solve real-world problems as you learn the fundamentals of programming using Python 3. You'll learn about...

VoIP Deployment For Dummies (Computer/Tech)
VoIP Deployment For Dummies (Computer/Tech)
It was February 2003 when my boss told me that I was going to be turning up a new VoIP softswitch. This was the first time I had ever heard of a softswitch, and about the second time I had heard of the term VoIP. There was a loose association of companies, hardware vendors, software guys, programmers, salesmen, and support staff that had to be...
How to Make it Big in the Seminar Business
How to Make it Big in the Seminar Business

How to Make It Big in the Seminar Business is considered must have reading among consultants, speakers, and seminar leaders. Fully updated and revised, this new edition is packed with insider tips on determining fees, marketing, scheduling, presentation technologies, and much more. It features new chapters on using the Web and other...

How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
Software by Numbers: Low-Risk, High-Return Development
Software by Numbers: Low-Risk, High-Return Development

Ultimately, software development is about creating value-yet, all too often, applications fail to deliver the business value customers need. This book will help you change that, by linking software development directly to value creation. You'll learn how to identify which features add value and which don't-and refocus on...

Java 7 Recipes: A Problem-Solution Approach
Java 7 Recipes: A Problem-Solution Approach

Java 7 Recipes offers solutions to common programming problems encountered every day while developing Java-based applications. Fully updated with the newest features and techniques available, Java 7 Recipes provides code examples involving Servlets, Java FX 2.0, XML, Java Swing, and much more. Content is presented in the...

Flash 8 ActionScript Bible
Flash 8 ActionScript Bible

To create Flash applications that sizzle, you have to learn the code. In this comprehensive guide to the latest version of ActionScript, the object-oriented scripting language for Macromedia Flash, you'll get the detailed instruction and step-by-step tutorials you need to write robust code and create sophisticated interactive animations. Work...

Design for Emergence:  Collaborative Social Play with Online and Location-Based Media, Volume 153 Frontiers in Artificial Intelligence and Applications
Design for Emergence: Collaborative Social Play with Online and Location-Based Media, Volume 153 Frontiers in Artificial Intelligence and Applications
This thesis is an attempt to address the spontaneous, often unpredictable uses of technology that can foster feelings of social participation. A key idea is that social processes and dynamics advance technological design. Consider the most recent applications that are primarily focused on social interaction: social software (Allen, 2004),...
Cardiovascular Prevention and Rehabilitation
Cardiovascular Prevention and Rehabilitation
Over the past decades the medical care of the patient with cardiovascular disease (CVD) has shown an impressive development, with marked positive consequences for mortality, morbidity, and the quality of life of coronary patients. This improvement has profoundly changed the arena in which cardiac rehabilitation (CR) has been acting...
Statistical Analysis with Excel For Dummies (Computer/Tech)
Statistical Analysis with Excel For Dummies (Computer/Tech)

Take the mystery out of statistical terms and put Excel to work!

If you need to create and interpret statistics in business or classroom settings, this easy-to-use guide is just what you need. It shows you how to use Excel's powerful tools for statistical analysis, even if you've never taken a course in statistics....

Personal Firewalls for Administrators and Remote Users
Personal Firewalls for Administrators and Remote Users

Personal firewalls explained—for remote corporate and home users.

In today's work environment, increasing numbers of mobile employees are using PCs, laptops, and handheld devices to connect to corporate servers. That's great for productivity, but it can also pose a security nightmare. Many of these...

unlimited object storage image
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy