Home | Amazing | Today | Tags | Publishers | Years | Search 
A Grammatical View of Logic Programming (Logic Programming)
A Grammatical View of Logic Programming (Logic Programming)

Within the field of logic programming there have been numerous attempts to transform grammars into logic programs. This book describes a complementary approach that views logic programs as grammars and shows how this new presentation of the foundations of logic programming, based on the notion of proof trees, can enrich the field.
...

The First Computers--History and Architectures (History of Computing)
The First Computers--History and Architectures (History of Computing)
"A cohesive, well-defined discussion of the architecture of early computers."
Mary Croarken, Business History

"A well-balanced and fascinating perspective on a wide range of early computing devices."
Nathan Ensmenger, IEEE Spectrum
...
Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)
Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)
In just 24 lessons of one hour or less, you will uncover the inner workings of TCP/IP. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of TCP/IP from the ground up.

 

Practical discussions provide...

Oracle Essbase 9 Implementation Guide
Oracle Essbase 9 Implementation Guide

The hot new data analysis trends involve business intelligence and analytics. The technology that supports business intelligence and analytics better than anything else is today's multidimensional OLAP technology - and there is none better than Oracle Essbase! Although storing data in a cube and developing analytical applications leaves...

Accuracy and Reliability in Scientific Computing (Software, Environments, Tools)
Accuracy and Reliability in Scientific Computing (Software, Environments, Tools)
Accuracy and Reliability in Scientific Computing can be considered a handbook for improving the quality of scientific computing. It will help computer scientists address the problems that affect software in general as well as the particular challenges of numerical computation.

Numerical software is used to test scientific
...
Learning OpenVPN 2.0.9
Learning OpenVPN 2.0.9

OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi, and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPsec VPN implementations. It uses the secure and stable TLS/SSL...

The Complete Android Guide: 3Ones
The Complete Android Guide: 3Ones

Google's Android operating system for phones is definitely a moving target. During the production of this book's first version, the latest Android version available on a cutting-edge phone jumped from 1.6 to 2.2. In that time, too, phones made by HTC and Motorola became exceedingly popular, and modified versions of the Android...

Development of Multimodal Interfaces: Active Listening and Synchrony: Second COST 2102 International Training School
Development of Multimodal Interfaces: Active Listening and Synchrony: Second COST 2102 International Training School
This volume brings together, through a peer-revision process, the advanced research results obtained by the European COST Action 2102: Cross-Modal Analysis of Verbal and Nonverbal Communication, primarily discussed for the first time at the Second COST 2102 International Training School on “Development of Multimodal...
Sams Teach Yourself TCP/IP in 24 Hours (5th Edition) (Sams Teach Yourself -- Hours)
Sams Teach Yourself TCP/IP in 24 Hours (5th Edition) (Sams Teach Yourself -- Hours)

 

Welcome to Sams Teach Yourself TCP/IP in 24 Hours, Fifth Edition. This book provides a clear and concise introduction to TCP/IP for newcomers, and also for users who have worked with TCP/IP but would like a little more of the inside story. Unlike other networking primers that point and click
...
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Teach Your Kids to Code: A Parent-Friendly Guide to Python Programming
Teach Your Kids to Code: A Parent-Friendly Guide to Python Programming

Teach Your Kids to Code is a parent's and teacher's guide to teaching kids basic programming and problem solving using Python, the powerful language used in college courses and by tech companies like Google and IBM.

Step-by-step explanations will have kids learning computational thinking right away, while
...

Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Result Page: 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy