Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Exploring Java 9: Build Modularized Applications in Java
Exploring Java 9: Build Modularized Applications in Java
Discover all the new features and changes in Java 9, including module systems―JPMS or Project Jigsaw. This book covers the whole Java application development life cycle. You'll review all the important concepts, including module descriptor, unnamed module, automatic module, and command line tools. 

Building Web Applications with Visual Studio 2017: Using .NET Core and Modern JavaScript Frameworks
Building Web Applications with Visual Studio 2017: Using .NET Core and Modern JavaScript Frameworks

Learn how to build web applications from three Microsoft MVPs. After building the data application layer using Entity Framework Core and a RESTful service using ASP.NET Core, you will then build the client side web application three ways: first, using ASP.NET Core, then using Angular 2, and, finally, using React.  You will be...

Mastering Python Regular Expressions
Mastering Python Regular Expressions

For Python developers, this concise and down-to-earth guide to regular expressions is all you need to gain vital new knowledge. From a theoretical overview to Python specifics, it explains everything in crystal clear language.

Overview

  • Explore the workings of Regular Expressions in Python
  • ...
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart
C++ Without Fear: A Beginner's Guide That Makes You Feel Smart

If you’ve always wanted to learn how to program a computer, or to learn the widely used C++ programming language in particular, C++ Without Fear, Second Edition, offers...

Python Unlocked
Python Unlocked

Key Features

  • Write smarter, bug-free, high performance code with minimal effort
  • Uncover the best tools and options available to Python developers today
  • Deploy decorators, design patters, and various optimization techniques to use Python 3.5 effectively

Book...

Cloud Standards: Agreements That Hold Together Clouds
Cloud Standards: Agreements That Hold Together Clouds

Cloud computing is often described as providing computing resources the way electric utilities provide energy. In theory, anyone with an adequate connection to the Internet should be able to tap into a cloud provider and get exactly the computing resources they want when they want it, just like plugging into the electricity grid and...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

The Python Standard Library by Example (Developer's Library)
The Python Standard Library by Example (Developer's Library)

Distributed with every copy of Python, the standard library contains hundreds of modules that provide tools for interacting with the operating system, interpreter, and Internet. All of them are tested and ready to be used to jump start the development of your applications. This book presents selected examples demonstrating how to use the most...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Pro Perl Debugging
Pro Perl Debugging

Combining the best features of C, UNIX utilities, and regular expressions, Perl has grown as one of the most powerful and popular scripting languages. The valuable Perl is often used for system administration, text processing and Web programming. It is even being used for more exotic areas, like bioinformatics. Perl is supported by all of the...

Sudoku Programming with C
Sudoku Programming with C

Sudoku Programming with C teaches you how to write computer programs to solve and generate Sudoku puzzles. This is a practical book that will provide you with everything you need to write your own books of Sudoku Classic and Samurai puzzles. But be warned: after reading it, you'll discover that the puzzles in...

CompTIA A+ Certification All-in-One Exam Guide, 8th Edition (Exams 220-801 & 220-802)
CompTIA A+ Certification All-in-One Exam Guide, 8th Edition (Exams 220-801 & 220-802)

The bestselling CompTIA A+ reference and test preparation guide--fully revised for the new 2012 exam topics

Written by the leading authority on CompTIA A+ certification and training, the new edition of this trusted resource offers complete, up-to-date coverage of CompTIA A+ exams 220-801 and 220-802. You’ll find learning...

Result Page: 39 38 37 36 35 34 33 32 31 30 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy