Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The C++ Programming Language (hardcover) (4th Edition)
The C++ Programming Language (hardcover) (4th Edition)

The new C++11 standard allows programmers to express ideas more clearly, simply, and directly, and to write faster, more efficient code. Bjarne Stroustrup, the designer and original implementer of C++, has reorganized, extended, and completely rewritten his definitive reference and tutorial for programmers who want to use...

C++ Without Fear: A Beginner's Guide That Makes You Feel Smart
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart

If you’ve always wanted to learn how to program a computer, or to learn the widely used C++ programming language in particular, C++ Without Fear, Second Edition, offers...

Building Web Applications with Visual Studio 2017: Using .NET Core and Modern JavaScript Frameworks
Building Web Applications with Visual Studio 2017: Using .NET Core and Modern JavaScript Frameworks

Learn how to build web applications from three Microsoft MVPs. After building the data application layer using Entity Framework Core and a RESTful service using ASP.NET Core, you will then build the client side web application three ways: first, using ASP.NET Core, then using Angular 2, and, finally, using React.  You will be...

Computer Networking Illuminated (Jones and Bartlett Illuminated)
Computer Networking Illuminated (Jones and Bartlett Illuminated)
The study of computer networking concepts and administration is an essential part of the education of computer science and information science students. A basic networking course should provide a strong theoretical background, practice in network design and creation, and the experience of maintaining and managing a network. Having taught computer...
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Services Computing
Services Computing
As the core technical foundation for the modern services science, Services Computing covers the science, technology and business models of effectively creating and leveraging computing technology to bridge the gap between business and IT services. This book systematically introduces the fundamentals of this new discipline based on the latest...
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

COM and .NET Interoperability
COM and .NET Interoperability

COM and .NET Interoperability provides a complete overview on the process of building .NET applications which interact (interoperate) with existing COM code. Before digging into that critical topic, Andrew offers a concise overview of the COM architecture, and provides examples using various COM frameworks (C++, ATL, and VB 6.0)....

Professional NoSQL
Professional NoSQL

A hands-on guide to leveraging NoSQL databases

NoSQL databases are an efficient and powerful tool for storing and manipulating vast quantities of data. Most NoSQL databases scale well as data grows. In addition, they are often malleable and flexible enough to accommodate semi-structured and sparse data sets. This...

Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

Get up to speed on the latest Group Policy tools, features, and best practices

Group Policy, Fundamentals, Security, and the Managed Desktop, 3rd Edition helps you streamline Windows and Windows Server management using the latest Group Policy tools and techniques. This updated edition covers Windows 10...

Penetration Testing with the Bash shell
Penetration Testing with the Bash shell

Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools

About This Book

  • Utilize the command line to create, run, and execute tests
  • Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
Data Integration Life Cycle Management with SSIS: A Short Introduction by Example
Data Integration Life Cycle Management with SSIS: A Short Introduction by Example
Build a custom BimlExpress framework that generates dozens of SQL Server Integration Services (SSIS) packages in minutes. Use this framework to execute related SSIS packages in a single command. You will learn to configure SSIS catalog projects, manage catalog deployments, and monitor SSIS catalog execution and history.

...
Result Page: 38 37 36 35 34 33 32 31 30 29 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy