Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Programming in the UNIX Environment, 3rd Edition
Advanced Programming in the UNIX Environment, 3rd Edition

For more than twenty years, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W. Richard Stevens’ Advanced Programming in the UNIX® Environment . Now, once again, Rich’s colleague Steve...

Wireless Sensor Networks: Technology, Protocols, and Applications
Wireless Sensor Networks: Technology, Protocols, and Applications
Infrastructure for Homeland Security Environments

Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way...

Professional Search Engine Optimization with PHP: A Developer's Guide to SEO
Professional Search Engine Optimization with PHP: A Developer's Guide to SEO
Professional Search Engine Optimization with PHP

Search engine optimization (SEO) is not only the job of the marketing department. It must be considered from a web site's inception and throughout its lifetime by you, the web site developer. Making changes to the architecture of a web site and modifying presentation techniques...

Advanced Programming in the UNIX® Environment: Second Edition
Advanced Programming in the UNIX® Environment: Second Edition
"Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations...
C Traps and Pitfalls
C Traps and Pitfalls
C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual behavior of a program to differ. The book's experienced author, Koenig, follows up with examples and helpful advice on many of these "pitfalls." Each chapter includes exercises for...
The Nothing That Is: A Natural History of Zero
The Nothing That Is: A Natural History of Zero
A symbol for what is not there, an emptiness that increases any number it's added to, an inexhaustible and indispensable paradox. As we enter the year 2000, zero is once again making its presence felt. Nothing itself, it makes possible a myriad of calculations. Indeed, without zero mathematics as we know it would not exist. And without mathematics...
TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)
TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition) (Addison-Wesley Professional Computing Series)

“For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable.”

—Vint Cerf, Internet pioneer

 

...
Sacred Schisms: How Religions Divide
Sacred Schisms: How Religions Divide
Schism (from the Greek 'to split') refers to a group that breaks away from another, usually larger organisation and forms a new organisation. Though the term is typically confined to religious schisms, it can be extended to other kinds of breakaway groups. Because schisms emerge out of controversies, the term has negative connotations. Though they...
Network Programming with Perl
Network Programming with Perl

Network Programming with Perl is a comprehensive, example-rich guide to creating network-based applications using the Perl programming language. Among its many capabilities, modern Perl provides a straightforward and powerful interface to TCP/IP, and this book shows you how to leverage these...

Content Networking: Architecture, Protocols, and Practice (The Morgan Kaufmann Series in Networking)
Content Networking: Architecture, Protocols, and Practice (The Morgan Kaufmann Series in Networking)
"This book is an invaluable resource for anyone interested in understanding the rationale and technology driving the evolution of the Web. I especially liked the way the authors tie together the various elements and protocols that make up content distribution systems over the Web."
--Prof. Dr. Ralf Steinmetz, Head of Multimedia
...
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It briefly describes the history of the cyberforensics field and places the subsequent chapters into context. The last section of the introduction, Expert Explanations, describes the format of the following sections and also how the sections complement...
CMMI Distilled: A Practical Introduction to Integrated Process Improvement (3rd Edition) (The SEI Series in Software Engineering)
CMMI Distilled: A Practical Introduction to Integrated Process Improvement (3rd Edition) (The SEI Series in Software Engineering)
CMMI® (Capability Maturity Model® Integration) is an integrated, extensible framework for improving process capability and quality across an organization. It has become a cornerstone in the implementation of continuous improvement for both industry and governments around the world. Rich in both detail and guidance for a wide set of...
Result Page: 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy