Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Java Closures and Lambda
Java Closures and Lambda
This book is the culmination of many brash years and hard lessons. The story starts all the way back when I migrated from C++ into perl. The perl programming language was amazingly powerful compared to the low-level manipulations and bookkeeping of C++. (The fact that it was “slow” never bothered me – I would rather write...
ArcGIS for JavaScript developers by Example
ArcGIS for JavaScript developers by Example

Key Features

  • Unshackle your GIS application from a workstation! Get running with three major web mapping projects covering all the important aspects of the ArcGIS JavaScript API.
  • Set a strong foundation for the ArcGIS JavaScript API and modular coding with dojo.
  • Gain a crystal clear...
Statistical Approach to Quantum Field Theory: An Introduction (Lecture Notes in Physics)
Statistical Approach to Quantum Field Theory: An Introduction (Lecture Notes in Physics)

Over the past few decades the powerful methods of statistical physics and Euclidean quantum field theory have moved closer together, with common tools based on the use of path integrals. The interpretation of Euclidean field theories as particular systems of statistical physics has opened up new avenues for understanding strongly coupled...

Moodle for Mobile Learning
Moodle for Mobile Learning

Mobile devices have become ubiquitous, and both smartphones and tablets offer so many new possibilities for learning. Moodle is gradually becoming more mobile-friendly, with the inclusion of a mobile theme in Moodle 2, the availability of responsive third-party themes, and the launch of an official Moodle app. Moodle and mobile are coming...

Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

SQL Demystified
SQL Demystified

There’s no easier, faster, or more practical way to learn the really tough subjects

SQL Demystified explains how to use SQL (Structured Query Language)--the ubiquitous programming language for databases. Readers will learn to create database objects, add and retrieve data from a database, and modify...

Learning Robotics using Python
Learning Robotics using Python

Design, simulate, program, and prototype an interactive autonomous mobile robot from scratch with the help of Python, ROS, and Open-CV!

About This Book

  • Design, simulate, build and program an interactive autonomous mobile robot
  • Program Robot Operating System using Python
  • Get...
Implementing Domain-Driven Design
Implementing Domain-Driven Design

“For software developers of all experience levels looking to improve their results, and design and implement domain-driven enterprise applications consistently with the best current state of professional practice, Implementing Domain-Driven Design will impart a treasure trove of knowledge hard won within the DDD and...

Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
How do you use Windows PowerShell to navigate the filesystem, manage files and folders, or retrieve a web page? This introduction to the PowerShell language and scripting environment provides more than 400 task-oriented recipes to help you solve all kinds of problems. Intermediate to advanced system administrators will find more than 100...
Securing Social Media in the Enterprise
Securing Social Media in the Enterprise

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This...

RF Microelectronics (2nd Edition)
RF Microelectronics (2nd Edition)

The Acclaimed RF Microelectronics Best-Seller, Expanded and Updated for the Newest Architectures, Circuits, and Devices

 

Wireless communication has become almost as ubiquitous as electricity, but RF design continues to challenge engineers and...

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy