 |
|
|
|
|
|
 Object-Oriented Analysis and Design with Applications (2nd Edition)In this eagerly awaited second edition, Grady Booch draws upon the rich and varied results of those projects and offers improved methods for object development and a new, unified notation. With numerous examples implemented in C++, Booch illustrates essential concepts, explains the method, and shows successful applications in a variety of fields.... |  |  The Media, the Public and the Great Financial Crisis
This book explores the impact of the print and broadcast media on public knowledge and understanding of the 2008 Great Financial Crisis. It represents the first systemic attempt to analyse how mass media influenced public opinion and political events during this key period in Britain's economic history. To do this, the book... |  |  Secularists, Religion and Government in Nineteenth-Century America
This book shows how, through a series of fierce battles over Sabbath laws, legislative chaplains, Bible-reading in public schools and other flashpoints, nineteenth-century secularists mounted a powerful case for a separation of religion and government. Among their diverse ranks were religious skeptics, liberal Protestants, members of ... |
|
 Docker in Action
Summary
Docker in Action teaches readers how to create, deploy, and manage applications hosted in Docker containers.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the Technology
The idea behind... |  |  Web Design All-in-One For Dummies
All you need to know on web design in a thorough new edition
If you want just one complete reference on web design, this book is it. The newest edition of this essential guide features 650+ pages on the latest tools and new web design standards, such as HTML5, CSS 3, and other core technologies and page-building strategies.... |  |  Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these... |
|
|
Result Page: 143 142 141 140 139 138 137 136 135 134 |