Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Bitcoin: Learn How to Program Bitcoin from Scratch
Programming Bitcoin: Learn How to Program Bitcoin from Scratch

Dive into Bitcoin technology with this hands-on guide from one of the leading teachers on Bitcoin and Bitcoin programming. Author Jimmy Song shows Python programmers and developers how to program a Bitcoin library from scratch. You’ll learn how to work with the basics, including the math, blocks, network, and...

Beginning T-SQL: A Step-by-Step Approach
Beginning T-SQL: A Step-by-Step Approach
The card catalog at the local public library was my first database. The catalog made it possible to find books based on titles, authors, or subjects just like writing a SQL query. Of course, I could walk around and locate books because they were arranged thanks to the Dewey Decimal System, but having that old drawer-filled cabinet...
Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Beginning Windows 8 Data Development: Using C# and JavaScript (Expert's Voice in Windows)
Beginning Windows 8 Data Development: Using C# and JavaScript (Expert's Voice in Windows)

This book introduces novice developers to a range of data access strategies for storing and retreiving data both locally and remotely. It provides you with a range of fully working data access solutions and the insight you need to know when, and how, to apply each of the techniques to best advantage.

Focussing specifically on how...

Microeconomics (7th Edition)
Microeconomics (7th Edition)

KEY BENEFIT: This book is well known for its coverage of modern topics (Game theory, Economics of Information, and Behavioral Economics), clarity of its writing style and graphs, and integrated use of real world examples.

KEY TOPICS: The emphasis on relevance and application to...

60 Recipes for Apache CloudStack: Using the CloudStack Ecosystem
60 Recipes for Apache CloudStack: Using the CloudStack Ecosystem

Planning to deploy and maintain a public, private, or hybrid cloud service? This cookbook’s handy how-to recipes help you quickly learn and install Apache CloudStack, along with several API clients, API wrappers, data architectures, and configuration management technologies that work as part of CloudStack’s ecosystem.

...
Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

Web Development with Node and Express: Leveraging the JavaScript Stack
Web Development with Node and Express: Leveraging the JavaScript Stack

Learn how to build dynamic web applications with Express, a key component of the Node/JavaScript development stack. In this hands-on guide, author Ethan Brown teaches you the fundamentals through the development of a fictional application that exposes a public website and a RESTful API. You’ll also learn web architecture best...

Probability: With Applications and R
Probability: With Applications and R

An introduction to probability at the undergraduate level

Chance and randomness are encountered on a daily basis. Authored by a highly qualified professor in the field, Probability: With Applications and R delves into the theories and applications essential to obtaining a thorough understanding of probability.

...
Pivot Table Data Crunching (Business Solutions)
Pivot Table Data Crunching (Business Solutions)
Become a savvy Microsoft Excel user. Pivot tables are a great feature in Excel that help you organize and analyze data, but not many Excel users know how to use pivot tables. Pivot Table Data Crunching offers a comprehensive review of all the functionalities of Pivot Tables from author ...
Digital Image Forensics: There is More to a Picture than Meets the Eye
Digital Image Forensics: There is More to a Picture than Meets the Eye

Photographic imagery has come a long way from the pinhole cameras of the nineteenth century. Digital imagery, and its applications, develops in tandem with contemporary society’s sophisticated literacy of this subtle medium. This book examines the ways in which digital images have become ever more ubiquitous as legal and medical...

unlimited object storage image
Result Page: 147 146 145 144 143 142 141 140 139 138 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy