Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Persistence in PHP with Doctrine ORM
Persistence in PHP with Doctrine ORM

This book is designed for PHP developers and architects who want to modernize their skills through better understanding of Persistence and ORM. You'll learn through explanations and code samples, all tied to the full development of a web application.

Overview

  • Develop a fully functional Doctrine-backed...
ReactJS by Example- Building Modern Web Applications with React
ReactJS by Example- Building Modern Web Applications with React

Key Features

  • Create pragmatic real-world applications while learning React and its modern developer tools
  • Build sustainable user interfaces by transforming data into components of UI
  • Learn how to generate reusable ReactJS components effectively

Book Description

...

Java How To Program (Early Objects) (10th Edition)
Java How To Program (Early Objects) (10th Edition)

Note: You are purchasing a standalone product; MyProgrammingLab does not come packaged with this content. If you would like to purchase both the physical text and MyProgrammingLab search for ISBN-10: 0133813436 / ISBN-13: 9780133813432. That package includes ISBN-10: 0133807800 / ISBN-13: 9780133807806 and ISBN-10:...

Introduction to Genetic Algorithms for Scientists and Engineers
Introduction to Genetic Algorithms for Scientists and Engineers

This invaluable book has been designed to be useful to most practising scientists and engineers, whatever their field and however rusty their mathematics and programming might be. The approach taken is largely practical, with algorithms being presented in full and working code (in Basic, Fortran, Pascal And C) included on a floppy disk to...

6502 assembly-language programming for Apple, Commodore, and Atari computers
6502 assembly-language programming for Apple, Commodore, and Atari computers

Instructs those who have already programmed in high-level languages in programming with the more powerful and versatile assembly or machine language.

...
ASP.NET Core 2 Fundamentals: Build cross-platform apps and dynamic web services with this server-side web application framework
ASP.NET Core 2 Fundamentals: Build cross-platform apps and dynamic web services with this server-side web application framework

Imagine the boost in business if you can build large, rich web applications with little code and built-in Windows authentication. With this book, you can gain skills to develop real-world applications with ASP.NET Core 2.

Key Features

  • Adopts the application-centric approach to explain core...
Hands-On Data Structures and Algorithms with Python: Write complex and powerful code using the latest features of Python 3.7, 2nd Edition
Hands-On Data Structures and Algorithms with Python: Write complex and powerful code using the latest features of Python 3.7, 2nd Edition

Learn to implement complex data structures and algorithms using Python

Key Features

  • Understand the analysis and design of fundamental Python data structures
  • Explore advanced Python concepts such as Big O notation and dynamic programming
  • Learn functional...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Digital Image Processing: PIKS Inside, Third Edition.
Digital Image Processing: PIKS Inside, Third Edition.
The book is intended to be an “industrial strength” introduction to digital image
processing to be used as a text for an electrical engineering or computer science
course in the subject. Also, it can be used as a reference manual for scientists who
are engaged in image processing research, developers of image processing
...
The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
Java and XML
Java and XML
Two hot topics come together in this developer's guide from Brett McLaughlin, Java and XML. Both Java and XML are cross-platform technologies; by using Java for code and XML for transporting data, you can build truly portable applications. This title is aimed at intermediate to advanced programmers; while XML topics are explained more or...
Programming Windows Presentation Foundation
Programming Windows Presentation Foundation

Windows Presentation Foundation (WPF) (formerly known by its code name "Avalon") is a brand-new presentation framework for Windows XP and Windows Vista, the next version of the Windows client operating system. For developers, WPF is a cornucopia of new technologies, including a new graphics engine that supports 3-D...

unlimited object storage image
Result Page: 538 537 536 535 534 533 532 531 530 529 528 527 526 525 524 523 522 521 520 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy