Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C How to Program, Global Edition
C How to Program, Global Edition
Welcome to the C programming language and to C How to Program, Eighth Edition! This book presents leading-edge computing technologies for college students, instructors and software-development professionals.



...
Scientific Computing with Python 3
Scientific Computing with Python 3

Key Features

  • Your ultimate resource for getting up and running with Python numerical computations
  • Explore numerical computing and mathematical libraries using Python 3.x code with SciPy and NumPy modules
  • A hands-on guide to implementing mathematics with Python, with complete...
SQL Primer: An Accelerated Introduction to SQL Basics
SQL Primer: An Accelerated Introduction to SQL Basics
Modern society is driven by data. Whether it is at a personal level, like a notebook containing scribbled notes; or at a countrywide level like Census data, it has permeated all our workflows. There is always a growing need to efficiently store and organize it so that meaningful information can be extracted out of raw data. ...
Begin to Code with Python
Begin to Code with Python

Become a Python programmer–and have fun doing it!

Start writing software that solves real problems, even if you have absolutely no programming experience! This friendly, easy, full-color book puts you in total control of your own learning, empowering you to build...

Python: Master the Art of Design Patterns
Python: Master the Art of Design Patterns

About This Book

  • Learn all about abstract design patterns and how to implement them in Python 3
  • Understand the structural, creational, and behavioral Python design patterns
  • Get to know the context and application of design patterns to solve real-world problems in software...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Learning Docker - Second Edition: Build, ship, and scale faster
Learning Docker - Second Edition: Build, ship, and scale faster

Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture

About This Book

  • This up-to-date edition...
Software Testing 2020
Software Testing 2020

Software testing is at a very important crossroad, where it is going back to the roots on certain fronts while moving inexorably forward. For instance, test automation is growing in prominence, but manual testing is becoming a niche; we are increasingly collaborating with the developers, breaking the bounds of unrealistic...

DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
DevOps for Digital Leaders: Reignite Business with a Modern DevOps-Enabled Software Factory
Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications.

In DevOps for Digital Leaders, deep collective experience on both...
SQL Server 2017 Integration Services Cookbook: Powerful ETL techniques to load and transform data from almost any source
SQL Server 2017 Integration Services Cookbook: Powerful ETL techniques to load and transform data from almost any source

Harness the power of SQL Server 2017 Integration Services to build your data integration solutions with ease

About This Book

  • Acquaint yourself with all the newly introduced features in SQL Server 2017 Integration Services
  • Program and extend your packages to enhance their...
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll...
A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Result Page: 682 681 680 679 678 677 676 675 674 673 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy