Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Domain-Specific Languages (Addison-Wesley Signature Series (Fowler))
Domain-Specific Languages (Addison-Wesley Signature Series (Fowler))

When carefully selected and used, Domain-Specific Languages (DSLs) may simplify complex code, promote effective communication with customers, improve productivity, and unclog development bottlenecks. In Domain-Specific Languages, noted software development expert Martin Fowler first provides the information software...

The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)
The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)

Extensively revised to reflect improved Scrum practices and tools, this edition adds an all-new section of tips from the field. 



The 1st Edition has a 5-Star Amazon Customer Rating and 135 reviews.

Thousands of organizations are adopting Scrum to
...
Java 9 for Programmers (4th Edition) (Deitel Developer Series)
Java 9 for Programmers (4th Edition) (Deitel Developer Series)

The professional programmer’s Deitel® guide to Java® 9 and the powerful Java platform

 

Written for programmers with a background in another high-level language, this book applies the...

Visual Basic .NET Power Tools
Visual Basic .NET Power Tools

We can ask heretical questions such as why OOP should be used in all programming situations as many of its proponents insist. We can question the wisdom of allowing C programmers to write the narratives and code examples for the Help system in VB.NET. We can wonder why structures are included in VB.NET if OOP experts insist that you should...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Advanced Nutrition and Human Metabolism
Advanced Nutrition and Human Metabolism

Current, comprehensive, and designed to maximize clarity of the concepts you need to know, longtime best seller ADVANCED NUTRITION AND HUMAN METABOLISM, SIXTH EDITION delivers its signature quality content in a student-friendly presentation. This text is accessible, with relevant examples, illustrations, applications, tables, and figures to...

J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

The Compatibility Gene: How Our Bodies Fight Disease, Attract Others, and Define Our Selves
The Compatibility Gene: How Our Bodies Fight Disease, Attract Others, and Define Our Selves

This is the story of a few human genes and how we discovered what these genes do. We each have around 25,000 genes, but the genes in this story are those that vary the most from person to person. These genes--called compatibility genes--are, in effect, a molecular signature that distinguishes each of us as individuals. Davis tells the...

Serial Violence: Analysis of Modus Operandi and Signature Characteristics of Killers
Serial Violence: Analysis of Modus Operandi and Signature Characteristics of Killers
Written by renowned experts Bob Keppel and William Birnes, this book focuses on analyzing crimes of violence to unveil common characteristics that might prove useful in the successful identification, apprehension, and conviction of murderers. It details the historical origins of modus operandi as an investigative tool and discusses modern...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Fitness Made Simple: The Power to Change Your Body, The Power to Change Your Life
Fitness Made Simple: The Power to Change Your Body, The Power to Change Your Life

Discover John Basedow's secrets for getting the body you've always wanted

Fitness expert and media icon John Basedow's body-transforming plan is literally Fitness Made Simple. After trying just about every fitness fad and gimmick with little success, John developed this multidimensional approach that is...

Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Result Page: 12 11 10 9 8 7 6 5 4 3 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy