Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Parallel Programming Cookbook
Python Parallel Programming Cookbook

Master efficient parallel programming to build powerful applications using Python

About This Book

  • Design and implement efficient parallel software
  • Master new programming techniques to address and solve complex programming problems
  • Explore the world of parallel programming...
Neighbor Law: Fences, Trees, Boundaries and Noise
Neighbor Law: Fences, Trees, Boundaries and Noise
The world is full of barking dogs and trespassing trees, spite fences and 2 a.m. rock fests, but your neighbor's lack of consideration needn't be your lifelong headache. The Nolo Press guide to Neighbor Law, eruditely and accessibly written by attorney Cora Jordan, explains all the laws relevant to noise, obstructed views, and...
Where Men Hide
Where Men Hide
"If you ask men if they spend any time hiding, they usually look at you as if you're nuts. 'What, me hide?' But if you ask women whether men hide, they immediately know what you mean." -- from Where Men Hide

Where Men Hide is a spirited tour of the dark and often dirty places men go to find comfort, camaraderie,...

VMware Cookbook: A Real-World Guide to Effective VMware Use
VMware Cookbook: A Real-World Guide to Effective VMware Use
If you want to gain insight into the real-world uses of VMware ESX and ESXi, this book provides scores of step-by-step solutions for working with these products in a wide range of network environments. You'll not only learn the basics -- how to pool resources from hardware servers, computer clusters, networks, and storage, and then distribute...
Principles of Information Security
Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the smooth operation of communication and computing solutions becomes vital. However, recurring events such as virus and worm attacks and the success of criminal attackers illustrate the weaknesses in current information technologies and the...
A Practical Guide to The Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)
A Practical Guide to The Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)

This best-selling text has been revised to reflect the requirements of the 17th Edition of the IEEWiring Regulations (BS 7671: 2008).

It includes essential information on the new rules applied to special installations or locations, such as bathrooms, swimming pool locations, camping/caravan sites, marinas,...

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Synchronization of Parallel Programmes (Studies in computer science)
Synchronization of Parallel Programmes (Studies in computer science)

The use of modular and parallel programming languages, and the development of distributed architectures is having a profound influence on computer programming and systems design; hardware and performance can now conspire to produce much higher operating speeds than could previously be achieved through sequential processing. Executing...

Welding Metallurgy
Welding Metallurgy

The premier reference for welding metallurgy, completely revised and expanded

Since its initial publication in 1987, Welding Metallurgy has been the standard text for the instruction of welding in technical schools and as a reference for professional welders. Updating the existing material and adding a substantial amount of new...

VMware vSphere For Dummies (Computer/Tech)
VMware vSphere For Dummies (Computer/Tech)

Every so often, a technology comes along that changes the way we go about our everyday business. This technology is called a disruptive technology and has such a significant benefit or improvement that people are willing to change their normal way of doing things to incorporate the new technology. Virtualization is one of those disruptive...

Applied Semantic Web Technologies
Applied Semantic Web Technologies
Since Tim Berners-Lee’s original idea for a global system of interlinked hypertext documents from 1989, the World Wide Web has grown into the world’s biggest pool of human knowledge. Over the past few years, the Web has changed the way people communicate and exchange information. It has created new business...
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy