 |
|
|
 Programming Like a Pro for Teens
Are you ready to learn how to program a computer? You'll do just that in this book. PROGRAMMING LIKE A PRO FOR TEENS is written in a friendly, unassuming voice that makes it possible for you to master the ideas and concepts that professionals use for programming every day. You learn algorithmic thinking and problem-solving in addition to... |  |  Software Engineering: A Practitioner's Approach
When computer software succeeds—when it meets the needs of the people who use
it, when it performs flawlessly over a long period of time, when it is easy to modify
and even easier to use—it can and does change things for the better. But when software
fails—when its users are dissatisfied, when it is error prone, when... |  |  Database Processing (12th Edition)
The 12th edition of Database Processing: Fundamentals, Design, and Implementation refines
the organization and content of this classic textbook to reflect a new teaching and professional
workplace environment. Students and other readers of this book will benefit from new
content and features in this edition.
... |
|
|
 Knowledge Representation and Reasoning Under Uncertainty: Logic at Work
This volume is based on the International Conference Logic at Work, held in Amsterdam, The Netherlands, in December 1992. The 14 papers in this volume are selected from 86 submissions and 8 invited contributions and are all devoted to knowledge representation and reasoning under uncertainty, which are core issues of formal artificial... |  |  Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Security Strategy: From Requirements to Reality
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and... |
|
Result Page: 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 |