Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

Microsoft SQL Server 2012 Step by Step (Step by Step Developer)
Microsoft SQL Server 2012 Step by Step (Step by Step Developer)

Your hands-on, step-by-step guide to building applications with Microsoft SQL Server 2012

Teach yourself the programming fundamentals of SQL Server 2012—one step at a time. Ideal for beginning SQL Server database administrators and developers, this tutorial provides clear guidance and practical, learn-by-doing...

Designing SCADA Application Software: A Practical Approach
Designing SCADA Application Software: A Practical Approach

Automation systems, often referred to as SCADA systems, involve programming at several levels; these systems include computer type field controllers that monitor and control plant equipment such as conveyor systems, pumps, and user workstations that allow the user to monitor and control the equipment through color graphic displays. All of the...

Relational Theory for Computer Professionals (Theory in Practice)
Relational Theory for Computer Professionals (Theory in Practice)

All of today’s mainstream database products support the Sql language, and relational theory is what Sql is supposed to be based on. But are those products truly relational? Sadly, the answer is no. This book shows you what a real relational product would be like, and how and why it would be so much better than what’s...

Python Data Visualization Cookbook
Python Data Visualization Cookbook

As a developer with knowledge of Python you are already in a great position to start using data visualization. This superb cookbook shows you how in plain language and practical recipes, culminating with 3D animations.

Overview

  • Learn how to set up an optimal Python environment for data visualization
  • ...
Programming PHP
Programming PHP

This updated edition teaches everything you need to know to create effective web applications with the latest features in PHP 5.x. You’ll start with the big picture and then dive into language syntax, programming techniques, and other details, using examples that illustrate both correct usage and common idioms.

If...

Practical PHP and MySQL Website Databases: A Simplified Approach (Expert's Voice in Web Development)
Practical PHP and MySQL Website Databases: A Simplified Approach (Expert's Voice in Web Development)

Practical PHP and MySQL Website Databases is a project-oriented book that demystifies building interactive, database-driven websites. The focus is on getting you up and running as quickly as possible. In the first two chapters you will set up your development and...

The LEGO MINDSTORMS EV3 Laboratory: Build, Program, and Experiment with Five Wicked Cool Robots
The LEGO MINDSTORMS EV3 Laboratory: Build, Program, and Experiment with Five Wicked Cool Robots

The LEGO® MINDSTORMS® EV3 set offers so many new and exciting features that it can be hard to know where to begin. Without the help of an expert, it could take months of experimentation to learn how to use the advanced mechanisms and numerous programming features.

In The LEGO MINDSTORMS EV3 Laboratory, author
...

Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Express Web Application Development
Express Web Application Development

Here's a comprehensive guide to making the most of Express's flexibility in building web applications. With lots of screenshots and examples, it's the perfect step-by-step manual for those with an intermediate knowledge of JavaScript.

Overview

  • Exploring all aspects of web development using the...
KNIME Essentials
KNIME Essentials

Perform accurate data analysis using the power of KNIME

Overview

  • Learn the essentials of KNIME, from importing data to data visualization and reporting
  • Utilize a wide range of data processing solutions
  • Visualize your final data sets using KNIME’s powerful data...
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy