Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Retrieval: Data Structures and Algorithms
Information Retrieval: Data Structures and Algorithms

Information retrieval is a sub-field of computer science that deals with the automated storage and retrieval of documents. Providing the latest information retrieval techniques, this guide discusses Information Retrieval data structures and algorithms, including implementations in C. Aimed at software engineers building systems with...

Java 9 for Programmers (4th Edition) (Deitel Developer Series)
Java 9 for Programmers (4th Edition) (Deitel Developer Series)

The professional programmer’s Deitel® guide to Java® 9 and the powerful Java platform

 

Written for programmers with a background in another high-level language, this book applies the...

Java How To Program (Early Objects) (10th Edition)
Java How To Program (Early Objects) (10th Edition)

Note: You are purchasing a standalone product; MyProgrammingLab does not come packaged with this content. If you would like to purchase both the physical text and MyProgrammingLab search for ISBN-10: 0133813436 / ISBN-13: 9780133813432. That package includes ISBN-10: 0133807800 / ISBN-13: 9780133807806 and ISBN-10:...

Java How to Program (early objects) (9th Edition) (Deitel)
Java How to Program (early objects) (9th Edition) (Deitel)

Welcome to Java and Java How to Program, Ninth Edition! This book presents leadingedge computing technologies for students, instructors and software developers.

The new Chapter 1 engages students with intriguing facts and figures to get them excited about studying computers and programming. The chapter includes a table of some of...

Developer Testing: Building Quality into Software (Addison-Wesley Signature Series (Cohn))
Developer Testing: Building Quality into Software (Addison-Wesley Signature Series (Cohn))

How do successful agile teams deliver bug-free, maintainable software—iteration after iteration? The answer is: By seamlessly combining development and testing. On such teams, the developers write testable code that enables them to verify it using various types of...

C: How to Program (6th Edition)
C: How to Program (6th Edition)

Welcome to the C programming language—and to C++, too! This book presents leadingedge computing technologies for students, instructors and software development professionals.

At the heart of the book is the Deitel signature “live-code approach.” Concepts are presented in the context of complete working...

Broadband Telecommunications Handbook
Broadband Telecommunications Handbook
THE BLOCKBUSTER OVERVIEW OF BROADBAND
Updated and Expanded to Reflect the Latest Technologies!

Whether you’re a “techie” or a business executive, getting a top-to-bottom understanding of broadband – the kind that will pay “real world” dividends at work -- has never been easier! In this...

Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
The nature of handwriting in our society has significantly altered over the ages due to the introduction of new technologies such as computers and the World Wide Web. With increases in the amount of signature verification needs, state of the art internet and paper-based automated recognition methods are necessary.

Pattern Recognition...

Developing Web Services with Apache Axis2
Developing Web Services with Apache Axis2

If you'd like to learn how to create web services (in particular, using Apache Axis2) and make some sense of various standards like SOAP, WSDL, MTOM, WS-Addressing, WS-Security, WS-Policy, XML Encryption and XML Signature, then this book is for you. Why? First, it has a tutorial style that walks you through in a step-by-step manner....

Visual Basic .NET Power Tools
Visual Basic .NET Power Tools

We can ask heretical questions such as why OOP should be used in all programming situations as many of its proponents insist. We can question the wisdom of allowing C programmers to write the narratives and code examples for the Help system in VB.NET. We can wonder why structures are included in VB.NET if OOP experts insist that you should...

Result Page: 12 11 10 9 8 7 6 5 4 3 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy