Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design Patterns in Python: Common GOF (Gang of Four) Design Patterns implemented in Python
Design Patterns in Python: Common GOF (Gang of Four) Design Patterns implemented in Python

*** Book also provides you FREE Access to Online Instructional Videos. See video codes in the book ***

This book is about the 23 common GoF (Gang of Four) Design Patterns implemented and in Python.

A Design Pattern is a description or template that can be repeatedly applied to a commonly recurring...

Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary is your full reference resource for all things cryptography.

Cryptography from A5/0 to ZRTP
 
Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for
...
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from...
Head First Design Patterns: Building Extensible and Maintainable Object-Oriented Software 2nd Edition
Head First Design Patterns: Building Extensible and Maintainable Object-Oriented Software 2nd Edition

What will you learn from this book?

You know you don't want to reinvent the wheel, so you look to Design Patterns: the lessons learned by those who've faced the same software design problems. With Design Patterns, you get to take advantage of the best practices and experience of others so you...

Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)

Even bad code can function. But if code isn’t clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn’t have to be that way.

Noted software expert Robert C. Martin presents a revolutionary paradigm with
...

How to Build Android Apps with Kotlin: A hands-on guide to developing, testing, and publishing your first apps with Android
How to Build Android Apps with Kotlin: A hands-on guide to developing, testing, and publishing your first apps with Android

Master the fundamentals of Android programming and apply your skills to create scalable and reliable apps using industry best practices

Key Features

  • Build apps with Kotlin, Google's preferred programming language for Android development
  • Unlock solutions to development...
Networking All-in-One For Dummies
Networking All-in-One For Dummies

Your ultimate one-stop networking reference 

Designed to replace that groaning shelf-load of dull networking books you’d otherwise have to buy and house, Networking All-in-One For Dummies covers all the basic and not-so-basic information you need to get a...

Serverless Single Page Apps: Fast, Scalable, and Available
Serverless Single Page Apps: Fast, Scalable, and Available

Don't waste your time building an application server. See how to build low-cost, low-maintenance, highly available, serverless single page web applications that scale into the millions of users at the click of a button. Quickly build reliable, well-tested single page apps that stay up and running 24/7 using Amazon Web Services. Avoid...

Data Visualization For Dummies
Data Visualization For Dummies

A straightforward, full-color guide to showcasing data soyour audience can see what you mean, not just read about it

Big data is big news! Every company, industry, not-for-profit,and government agency wants and needs to analyze and leveragedatasets that can quickly become ponderously large. Datavisualization software enables...

Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Leveraging WMI Scripting (HP Technologies)
Leveraging WMI Scripting (HP Technologies)

Leveraging Scripting is the second in a series of two books dedicated to WMI. Understanding WMI, Lissoir’s first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
unlimited object storage image
Result Page: 250 249 248 247 246 245 244 243 242 241 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy