Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Information Retrieval: Implementing and Evaluating Search Engines
Information Retrieval: Implementing and Evaluating Search Engines

An academic dynasty has come together to write an excellent textbook on information retrieval. Stefan Buttcher, Charles Clarke, and Gordon Cormack make up three generations of stellar information retrieval researchers with over fifty years of combined experience. Buttcher was Clarke's doctoral student, and Clarke was Cormack's...

Beginning PhoneGap (Wrox Programmer to Programmer)
Beginning PhoneGap (Wrox Programmer to Programmer)

THE WORLD OF MOBILE APP DEVELOPMENT is changing rapidly, and frameworks like PhoneGap represent an important step in broadening that world to a very large audience of experienced web developers. With PhoneGap, you can now transfer some (if not most) of your knowledge and skills from the web world to the mobile app world.

This...

Machine Learning for Hackers
Machine Learning for Hackers

To explain the perspective from which this book was written, it will be helpful to define the terms machine learning and hackers.

What is machine learning? At the highest level of abstraction, we can think of machine learning as a set of tools and methods that attempt to infer patterns and extract insight from a record of the...

Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

The present book 1 provides a rigorous treatment and coherent presentation of the consolidated results of the authors' work, over the past four years, on the employment of logic programming as a representational and reasoning tool. It comes out of a background of a world-wide research effort for at least the past six years on the...

Sinatra: Up and Running
Sinatra: Up and Running

When people speak of Ruby web development, it has historically been in reference to the opinionated juggernaut that is Rails. This is certainly not an unfounded association; Hulu, Yellow Pages, Twitter, and countless others have relied on Rails to power their (often massive) web presences, and Rails facilitates that process with zeal....

Railo 3 Beginner's Guide
Railo 3 Beginner's Guide

Railo Server is one of the quickest ways to start developing complex web applications. Widely considered as the fastest CFML (ColdFusion Markup Language) engine, Railo Server allows you to create dynamic web pages that can change depending on the user input, database lookups, or even the time of day.

Railo 3 Beginner's Guide...

jQuery Mobile: Up and Running
jQuery Mobile: Up and Running
This book is the ideal companion for web designers and developers wanting to create mobile experiences using jQuery Mobile. jQuery Mobile has appeared in the market to solve one problem: dozens of mobile platforms and browsers and the need to create compatible interfaces for all of them. This book...
AAA Identity Management Security (Networking Technology: Security)
AAA Identity Management Security (Networking Technology: Security)

This book is focused on providing the skills necessary to successfully configure authentication, authorization, and accounting (AAA) services on Cisco devices using Cisco Secure Access Control Server/System 4.2 and 5.1. This book was motivated by a desire to provide a one-stop resource for AAA solutions on Cisco...

Windows 8: Out of the Box
Windows 8: Out of the Box

Get a real feel for Windows 8 with a wealth of tips in this step-by-step guide. After using Windows 7 or XP, learning Microsoft’s latest operating system takes some adjustment. Never fear. Windows expert Mike Halsey starts with the basics and then takes you through the trickier parts of Microsoft’s latest operating...

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

Macintosh Terminal Pocket Guide
Macintosh Terminal Pocket Guide

Unlock the secrets of the Terminal and discover how this powerful tool solves problems the Finder can’t handle. With this handy guide, you’ll learn commands for a variety of tasks, such as killing programs that refuse to quit, renaming a large batch of files in seconds, or running jobs in the background while you do other...

Result Page: 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy