Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)
The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)

The “Bible” for Rails Development: Fully Updated for Rails 5

 

“When I read The Rails Way for the first time, I felt like I truly understood Rails for the first time.”

...
C++ Common Knowledge: Essential Intermediate Programming
C++ Common Knowledge: Essential Intermediate Programming

What Every Professional C++ Programmer Needs to Know—Pared to Its Essentials So It Can Be Efficiently and Accurately Absorbed

C++ is a large, complex language, and learning it is never entirely easy. But some concepts and techniques must be thoroughly mastered if...

Professional Software Development: Shorter Schedules, Higher Quality Products, More Successful Projects, Enhanced Careers
Professional Software Development: Shorter Schedules, Higher Quality Products, More Successful Projects, Enhanced Careers

Can you deliver 90% of your software on time, within budget, and fully meet the user's real requirements? Would you like to? Best-selling author Steve McConnell provides a compelling argument for turning software success into an everyday habit by advancing the software profession itself-at the individual, organizational, and...

Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2), is a Cisco®-authorized, self-paced learning tool for CCNA® foundation learning. This book provides you with the knowledge needed to install, operate, and troubleshoot a small to medium-size branch office enterprise network, including configuring several switches and routers,...
LINQ in Action
LINQ in Action
LINQ, Language INtegrated Query, is a new extension to the Visual Basic and C# programming languages designed to simplify data queries and database interaction. It addreses O/R mapping issues by making query operations like SQL statements part of the programming language. It also offers built-in support for querying in-memory collections like...
Designing the Internet of Things
Designing the Internet of Things

Take your idea from concept to production with this unique guide

Whether it's called physical computing, ubiquitous computing, or the Internet of Things, it's a hot topic in technology: how to channel your inner Steve Jobs and successfully combine hardware, embedded software, web services, electronics, and cool...

Cisco LAN Switching Configuration Handbook (2nd Edition)
Cisco LAN Switching Configuration Handbook (2nd Edition)

Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Engineering Innovative Products: A Practical Experience
Engineering Innovative Products: A Practical Experience

"The book provides vital insights into commercial development for engineering students in a highly practical and applied manner. Over the past 3 years, application of the book’s material has allowed the students to develop their commercial literacy and ambition in the University."
Steve Orr, Director,
...

The Security Development Lifecycle
The Security Development Lifecycle
The software industry has been struggling with how to create and release software that is more security-enhanced and reliable— the Security Development Lifecycle (SDL) provides a methodology that works. Adapted from Microsoft's standard development process, SDL is a critical way to help reduce the number of security defects in code at every...
Web Security Field Guide
Web Security Field Guide
While the Internet has transformed and improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats. The challenge for successful, public web sites is to encourage access to the site while eliminating undesirable or malicious traffic and to provide sufficient...
Software Estimation: Demystifying the Black Art (Best Practices)
Software Estimation: Demystifying the Black Art (Best Practices)

Unlike other books that focus exclusively on the science of estimation—including rigid modeling techniques and continuous feedback loops that are not cost effective to most organizations—this unique guide offers practical, tested, hands-on advice for estimating software development costs in the real world. It is written by the...

Result Page: 26 25 24 23 22 21 20 19 18 17 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy