Home | Amazing | Today | Tags | Publishers | Years | Search 
Parallel Programming: for Multicore and Cluster Systems
Parallel Programming: for Multicore and Cluster Systems

Innovations in hardware architecture, like hyper-threading or multicore processors, mean that parallel computing resources are available for inexpensive desktop computers. In only a few years, many standard software products will be based on concepts of parallel programming implemented on such hardware, and the range of applications will be...

Learning Vaadin
Learning Vaadin

Having a command of the Vaadin framework means your Java web applications will look and perform brilliantly. Learn how with this all-inclusive, step-by-step tutorial to mastering Rich Internet Application development.

Overview

  • Discover the Vaadin framework in a progressive and structured...
Learn to Program, Second Edition (The Facets of Ruby Series)
Learn to Program, Second Edition (The Facets of Ruby Series)

Printed in full color.

For this new edition of the best-selling Learn to Program, Chris Pine has taken a good thing and made it even better. First, he used the feedback from hundreds of reader e-mails to update the content and make it even clearer. Second, he updated the examples in the book to use the latest
...

FreeRADIUS Beginner's Guide
FreeRADIUS Beginner's Guide

This is a fast-paced Beginner's Guide that will take you step by step through the fundamentals of FreeRADIUS and using it in your live projects. It has been structured in a way that will let you get maximum practical information out of it in setting up your own FreeRADIUS server. It will guide you on all the aspects of FreeRADIUS and do...

Linked Data: Structured Data on the Web
Linked Data: Structured Data on the Web

Summary

Linked Data presents the Linked Data model in plain, jargon-free language to Web developers. Avoiding the overly academic terminology of the Semantic Web, this new book presents practical techniques, using everyday tools like JavaScript and Python.

About this Book

...

Ethical Hacking and Penetration Testing Guide
Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a...

Advanced Quantitative Finance with C++
Advanced Quantitative Finance with C++

Create and implement mathematical models in C++ using Quantitative Finance

About This Book

  • Describes the key mathematical models used for price equity, currency, interest rates, and credit derivatives
  • The complex models are explained step-by-step along with a flow chart of every...
A Guide to IT Contracting: Checklists, Tools, and Techniques
A Guide to IT Contracting: Checklists, Tools, and Techniques

Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal...

Advanced Network Programming – Principles and Techniques: Network Application Programming with Java (Computer Communications and Networks)
Advanced Network Programming – Principles and Techniques: Network Application Programming with Java (Computer Communications and Networks)

Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols,...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists

Feature engineering is a crucial step in the machine-learning pipeline, yet this topic is rarely examined on its own. With this practical book, you’ll learn techniques for extracting and transforming features—the numeric representations of raw data—into formats for machine-learning models. Each chapter guides you...

Practical SQL: A Beginner's Guide to Storytelling with Data
Practical SQL: A Beginner's Guide to Storytelling with Data

Practical SQL is an approachable and fast-paced guide to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases. The book focuses on using SQL to find the story your data tells, with the popular open-source database PostgreSQL and the pgAdmin interface as...

Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy