Machinery's Handbook 28th Larger Print Edition (Machinery's Handbook)
Celebrating nearly 100 years as The Bible of the Mechanical Industries , the 28th edition brings together volumes of knowledge, information and data gathered, revised and improved upon from experts throughout the mechanical industries. Extraordinarily comprehensive yet easy to use since it premiered, Machinery s Handbook provides mechanical...
Java 9 Revealed: For Early Adoption and Migration
Explore the new Java 9 modules, SDK, JDK, JVM, JShell and more in this comprehensive book that covers what’s new in Java 9 and how to use these new features. Java 9 Revealed
is for experienced Java programmers looking to migrate to Java 9. Author Kishori Sharan
begins by covering how to develop Java...
.NET Programming: A Practical Guide Using C# (HP Professional Series) Takes a straightforward, hands-on approach to explain everything you need to know from development to deployment and maintenance for this platform-all from a developer's perspective. Softcover. CD-ROM included.
Enterprise-class .NET programming in C#—from a developer's perspective.
* Internals of the...
Python Parallel Programming Cookbook
Master efficient parallel programming to build powerful applications using Python
About This Book
Design and implement efficient parallel software
Master new programming techniques to address and solve complex programming problems
Explore the world of parallel programming...
Multithreading in C# 5.0 Cookbook
Multithreaded programming can seem overwhelming but this book clarifies everything through its cookbook approach. Packed with practical tasks, it's the quick and easy way to start delving deep into the power of multithreading in C#.
Delve deep into the .NET threading infrastructure and use...
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security...
|Result Page: 11 10 9 8 7 6 5 4 3 2 |