Home | Amazing | Today | Tags | Publishers | Years | Search 
Finite Element Modeling for Materials Engineers Using MATLAB®
Finite Element Modeling for Materials Engineers Using MATLAB®

The finite element method is often used for numerical computation in the applied sciences. It makes a major contribution to the range of numerical methods used in the simulation of systems and irregular domains, and its importance today has made it an important subject of study for all engineering students.
 
...

Rails AntiPatterns: Best Practice Ruby on Rails Refactoring (Addison-Wesley Professional Ruby Series)
Rails AntiPatterns: Best Practice Ruby on Rails Refactoring (Addison-Wesley Professional Ruby Series)
The Complete Guide to Avoiding and Fixing Common Rails 3 Code and Design Problems

As developers worldwide have adopted the powerful Ruby on Rails web framework, many have fallen victim to common mistakes that reduce code quality, performance, reliability, stability, scalability, and maintainability.
...
MySQL to DB2 Conversion Guide
MySQL to DB2 Conversion Guide

Switching database vendors is often considered an exhausting challenge for database administrators and developers. Complexity, total cost, and the risk of downtime are often the reasons that restrain IT decision makers from starting the migration project. The primary goal of this book is to show that, with the proper planning and...

The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)
The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)

The “Bible” for Rails Development: Fully Updated for Rails 5

 

“When I read The Rails Way for the first time, I felt like I truly understood Rails for the first time.”

...
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

C: How to Program, 7th Edition
C: How to Program, 7th Edition

For introductory courses in C Programming. Also for courses in Programming for Engineers, Programming for Business, and Programming for Technology.

The Deitels' How to Program series offers unparalleled breadth and depth of object-oriented programming concepts and intermediate-level topics for further study. Using the...

Silk: Trade and Exchange along the Silk Roads between Rome and China in Antiquity (Ancient Textiles Series)
Silk: Trade and Exchange along the Silk Roads between Rome and China in Antiquity (Ancient Textiles Series)

"Already in Greek and Roman antiquity a vibrant series of exchange relationships existed between the Mediterranean regions and China, including the Indian subcontinents along well-defined routes we call the Silk Roads. Among the many goods that found their way from East to West and vice versa were glass, wine, spices, metals like iron,...

THE SILK ROAD ENCYCLOPEDIA
THE SILK ROAD ENCYCLOPEDIA

Literary Nonfiction. Asian & Asian American Studies. History. Since the concept of the Silk Road as an avenue of inter- civilizational exchange emerged more than 130 years ago, scholars from both Eastern and Western societies have conducted persistent research to advance the field. Still, however, not nearly enough research has been...

Illustrating Pascal
Illustrating Pascal

This book provides an introduction to programming in Pascal for the complete beginner. It starts with the fundamental concept of a stored program and works through to the manipulation of records in dynamic storage. The style of presentation is pictorial, with well-chosen illustrations replacing lengthy descriptions. Besides defining the...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy