Home | Amazing | Today | Tags | Publishers | Years | Search 
Understanding Computation: From Simple Machines to Impossible Programs
Understanding Computation: From Simple Machines to Impossible Programs
This book is for programmers who are curious about programming languages and the theory of computation, especially those who don’t have a formal background in mathematics or computer science.

If you’re interested in the mind-expanding parts of computer science that deal with programs,
...
Instant Munin Plugin Starter
Instant Munin Plugin Starter

The real challenge of performance issues comes from trying to get to the root of the problem. Having a monitoring system set up makes your life, as a system administrator, a lot easier.

The Instant Munin Plugin Starter is a practical, hands-on guide that teaches you how to set up and monitor your network. Through a simple...

Instant Citrix Security How-to
Instant Citrix Security How-to

With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.

"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing...

Vagrant: Up and Running
Vagrant: Up and Running

Discover why Vagrant is a must-have tool for thousands of developers and ops engineers. This hands-on guide shows you how to use this open source software to build a virtual machine for any purpose—including a completely sandboxed, fully provisioned development environment right on your desktop.

Vagrant creator...

R for Business Analytics
R for Business Analytics

R for Business Analytics looks at some of the most common tasks performed by business analysts and helps the user navigate the wealth of information in R and its 4000 packages.  With this information the reader can select the packages that can help process the analytical tasks with minimum effort and maximum usefulness. The use of...

Introduction to Reliable Distributed Programming
Introduction to Reliable Distributed Programming

In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail.

Guerraoui and Rodrigues present an introductory description of...

A Course in Formal Languages, Automata and Groups (Universitext)
A Course in Formal Languages, Automata and Groups (Universitext)
This book is based on notes for a master’s course given at Queen Mary, University of London, in the 1998/9 session. Such courses in London are quite short, and the course consisted essentially of the material in the first three chapters, together with a two-hour lecture on connections with group theory. Chapter 5 is a...
OpenCV Computer Vision with Python
OpenCV Computer Vision with Python

This book will show you how to use OpenCVs Python bindings to capture video, manipulate images, and track objects with either a normal webcam or a specialized depth sensor, such as the Microsoft Kinect. OpenCV is an open source, cross-platform libran' that provides building blocks for computer vision experiments and applications. It...

Computer Science Programming Basics in Ruby
Computer Science Programming Basics in Ruby

If you know basic high-school math, you can quickly learn and apply the core concepts of computer science with this concise, hands-on book. Led by a team of experts, you’ll quickly understand the difference between computer science and computer programming, and you’ll learn how algorithms help you solve computing...

Managing Risk and Information Security: Protect to Enable
Managing Risk and Information Security: Protect to Enable
Newly promoted CISOs rapidly realize that the scope of the position they have taken on is often beyond what they have been prepared for. The nature of securing an enterprise is daunting and overwhelming. There are no simple checklists or roadmaps for success. Many of the technical security skills a CISO has acquired during the early...
Pyomo - Optimization Modeling in Python (Springer Optimization and Its Applications, Vol. 67)
Pyomo - Optimization Modeling in Python (Springer Optimization and Its Applications, Vol. 67)

This book provides a complete and comprehensive reference/guide to Pyomo (Python Optimization Modeling Objects) for both beginning and advanced modelers, including students at the undergraduate and graduate levels, academic researchers, and practitioners. The text illustrates the breadth of the modeling and analysis capabilities that are...

Smashing Android UI (Smashing Magazine Book Series)
Smashing Android UI (Smashing Magazine Book Series)

Designers and developers, create smashing apps for Android devices

If you're developing applications for Android smartphones and tablets, you know it isn't enough just to create the app. The application has to be intuitive, well laid out, and easy to use. Smashing Android UI shows you just how to do that....

Result Page: 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy