Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Drinking Water Handbook, Second Edition
The Drinking Water Handbook, Second Edition

When you open the tap to fill your glass with drinking water, you expect the water to be of good quality. But is the water from your tap really safe? The second edition of an industry-wide bestseller, The Drinking Water Handbook explains the many processes employed to make water safe to drink. Starting at the source, it...

Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem:...
Encyclopedia of Homeopathy
Encyclopedia of Homeopathy
Homeopathy is a holistic form of complementary medicine, aiming to treat the whole person rather than just the physical symptoms. It works on the principle that the mind and body are so strongly linked that physical conditions cannot be successfully treated without an understanding of the person’s constitution and character.
...
The Complete Q&A Job Interview Book
The Complete Q&A Job Interview Book

"The ultimate job interview book! A systematic, foolproof way to generate offers. No job seeker should be without it." --National Job Market "The programmed system works because it is a simple, practical, proven way to interview properly. Use it to win the interview and win the job!" --Mary Lyon, Associated Press...

Docker in Practice
Docker in Practice

Summary

An open source container system, Docker makes deploying applications painless and flexible. Docker is powerful and simple to use, and it makes life easier for developers and administrators alike providing shorter build times, fewer production bugs, and effortless application roll-out.

About...

Effortless E-Commerce with PHP and MySQL
Effortless E-Commerce with PHP and MySQL

Electronic commerce has been an important and viable part of the Internet for well over a decade now. From the behemoths like Amazon.com to the mom-and-pop online stores, e-commerce is performed in a number of ways. Despite the dozen, or hundred, of failures for every single commercial success, e-commerce can still be an excellent business...

Concurrent Programming: Algorithms, Principles, and Foundations
Concurrent Programming: Algorithms, Principles, and Foundations

The advent of new architectures and computing platforms means that synchronization and concurrent computing are among the most important topics in computing science. Concurrent programs are made up of cooperating entities -- processors, processes, agents, peers, sensors -- and synchronization is the set of concepts, rules and mechanisms that...

React 16 Tooling: Master essential cutting-edge tools, such as create-react-app, Jest, and Flow
React 16 Tooling: Master essential cutting-edge tools, such as create-react-app, Jest, and Flow

React 16 Tooling covers the most important tools, utilities, and libraries that every React developer needs to know - in detail.

Key Features

  • Each chapter presents meta-development solutions to help React developers
  • The tools used are presented in a practical,...
Bioeffects and Therapeutic Applications of Electromagnetic Energy
Bioeffects and Therapeutic Applications of Electromagnetic Energy

From cell phones to treating cancer, EM energy plays a part in many of the innovations that we take for granted everyday. A basic force of nature, like nuclear energy or gravity, this energy can be harnessed and used, but still holds the potential to be harmful. The question remains, how safe are EM products? Bioeffects and Therapeutic...

Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems
Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems

When creating real-time and embedded (RTE) systems, there is no room for error. The nature of the final product demands that systems be powerful, efficient, and highly reliable. The constraints of processor and memory resources add to this challenge. Sophisticated developers rely on design patterns—proven solutions to...

The Next Million Years.
The Next Million Years.
WHEN anyone starts to write on a subject, at which he has not hitherto worked professionally, his proper procedure should be to set out on a long course of reading, with careful preparatory annotations of all he has read. Such a course on a tremendous subject like the present one might easily take ten years. At the time when I determined to write...
Malware: Fighting Malicious Code
Malware: Fighting Malicious Code
Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy...
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy