Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Embedded Linux Programming: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell), 3rd Edition
Mastering Embedded Linux Programming: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell), 3rd Edition

Harness the power of Linux to create versatile and robust embedded solutions

Key Features

  • Learn how to develop and configure robust embedded Linux devices
  • Explore the new features of Linux 5.4 and the Yocto Project 3.1 (Dunfell)
  • Discover different ways to...
Rust High Performance: Learn to skyrocket the performance of your Rust applications
Rust High Performance: Learn to skyrocket the performance of your Rust applications

Find bottlenecks, identify the proper algorithm to use, optimize performance, and create really efficient Rust applications

Key Features

  • Understand common performance pitfalls and improve the performance of your applications.
  • Get to grips with parallel programming and...
Introduction to Forensic DNA Evidence for Criminal Justice Professionals
Introduction to Forensic DNA Evidence for Criminal Justice Professionals

The use of DNA profiling in forensic cases has been considered the most innovative technique in forensic science since fingerprinting, yet for those with limited scientific knowledge, understanding DNA enough to utilize it properly can be a daunting task. Introduction to Forensic DNA Evidence for Criminal Justice Professionals is...

Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
.NET 4.5 Parallel Extensions Cookbook
.NET 4.5 Parallel Extensions Cookbook

.NET parallel extensions brings the power of parallel and asynchronous programming to a much wider developer audience than ever before. This book will give a developer with no multithreaded development experience the ability to write highly scalable parallel applications that take advantage of modern multicore processors.If you are an...

PowerShell for SQL Server Essentials
PowerShell for SQL Server Essentials

Manage and monitor SQL Server administration and application deployment with PowerShell

About This Book

  • Create scripts using PowerShell to manage and monitor server administration and application deployment
  • Automate creation of SQL Database objects through PowerShell with the help of SQL...
Programming Persistent Memory: A Comprehensive Guide for Developers
Programming Persistent Memory: A Comprehensive Guide for Developers

Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times?a huge leap forward in byte-addressable...

Scala High Performance Programming
Scala High Performance Programming

Key Features Get the first book to explore Scala performance techniques in depth! Real-world inspired use cases illustrate and support the techniques studied and the language features This book is written by Vincent Theron and Michael Diamant, software engineers with several years of experience in the high-frequency trading and programmatic...

Introductory Statistics, Third Edition
Introductory Statistics, Third Edition

In this 3rd edition revised text, master expositor Sheldon Ross has produced a unique work in introductory statistics. The text's main merits are the clarity of presentation, contemporary examples and applications from diverse areas, and an explanation of intuition and ideas behind the statistical methods. Concepts are motivated,...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)

Vast amounts of data are nowadays collected, stored and processed, in an effort to assist in  making a variety of administrative and governmental decisions. These innovative steps considerably improve the speed, effectiveness and quality of decisions. Analyses are increasingly performed by data mining and profiling technologies that...

Python High Performance Programming
Python High Performance Programming

If you have at least a basic knowledge of Python, this book will help you maximize the performance of your code and applications. Easy to follow tutorials will make you a hard act to follow in Python programming.

Overview

  • Identify the bottlenecks in your applications and solve them using the best...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy