Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptography for Developers
Cryptography for Developers
The only guide for software developers who must learn and implement cryptography safely and cost effectively.

The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent
...
Rails 3 Way, The (2nd Edition) (Addison-Wesley Professional Ruby Series)
Rails 3 Way, The (2nd Edition) (Addison-Wesley Professional Ruby Series)

The Rails™ 3 Way is a comprehensive resource that digs into the new features in Rails 3 and perhaps more importantly, the rationale behind them.
—Yehuda Katz, Rails Core

The Bible for Ruby on Rails Application Development

 

...

Video Game Optimization
Video Game Optimization

Optimizing is a game of trade-offs.

There are many anecdotes, articles, and books about optimizing in specific scenarios. Sometimes, these include hard numbers; if so, it’s usually for hardware that is several years old. Often, the discussion is very specific, such as optimizing memory copies for a specific chip, and the...

Epidemics and Enslavement: Biological Catastrophe in the Native Southeast, 1492-1715 (Indians of the Southeast)
Epidemics and Enslavement: Biological Catastrophe in the Native Southeast, 1492-1715 (Indians of the Southeast)
Epidemics and Enslavement is a groundbreaking examination of the relationship between the Indian slave trade and the spread of Old World diseases in the colonial southeastern United States. Paul Kelton scrupulously traces the pathology of early European encounters with Native peoples of the Southeast and concludes that, while...
Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

HTML, XHTML & CSS For Dummies (Computer/Tech)
HTML, XHTML & CSS For Dummies (Computer/Tech)

Packed with useful tips, techniques, and code examples

Build quality Web pages with XHTML and add some pizzazz with CSS

You don't have to be a master programmer to build great Web pages! This book shows you what HTML is about and how to use XHTML to format great-looking pages. Then...

The Recording Engineer's Handbook
The Recording Engineer's Handbook
Working as a recording engineer presents challenges from every direction of your project. From using microphones to deciding on EQ settings, choosing outboard gear to understanding how, when and why to process your signal, the seemingly never-ending choices can be very confusing. Professional Audio's bestselling author Bobby Owsinski (The Mixing...
Spring Persistence with Hibernate (Beginning)
Spring Persistence with Hibernate (Beginning)

Persistence is an important set of techniques and technologies for accessing and transacting data, and ensuring that data is mobile regardless of specific applications and contexts. In Java development, persistence is a key factor in enterprise, e-commerce, and other transaction-oriented applications.

Today, the Spring Framework is...

Getting Started in Project Management
Getting Started in Project Management
So you’re new to project management. Well, you’re not alone.
Lots of people are discovering that project management is a
tool that can help make their projects more successful. You’ve
probably been doing projects for a long time: projects at work—such
as developing a new product, improving a process,
...
Multiobjective Optimization: Interactive and Evolutionary Approaches (Lecture Notes in Computer Science)
Multiobjective Optimization: Interactive and Evolutionary Approaches (Lecture Notes in Computer Science)
Multiobjective optimization deals with solving problems having not only one, but multiple, often conflicting, criteria. Such problems can arise in practically every field of science, engineering and business, and the need for efficient and reliable solution methods is increasing. The task is challenging due to the fact that, instead of a single...
Core Java, Volume II--Advanced Features (9th Edition) (Core Series)
Core Java, Volume II--Advanced Features (9th Edition) (Core Series)

Fully updated to reflect Java SE 7 language changes, Core Java®, Volume II—Advanced Features, Ninth Edition, is the definitive guide to Java’s most powerful features for enterprise and desktop application development.

 

With Clough, By Taylor
With Clough, By Taylor

Brian Clough famously remarked. "I'm not equipped to manage successfully without Peter Taylor. I am the shop window and he is the goods in the back."

Originally published in 1980, With Clough, By Taylor is the definitive account of the relationship that revolutionised English football and the trade...

unlimited object storage image
Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy