Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Quality Code: Software Testing Principles, Practices, and Patterns
Quality Code: Software Testing Principles, Practices, and Patterns

Test-driven, test-first, and test-early development practices are helping thousands of software development organizations improve their software. Now, in Quality Code: Software Testing Principles, Practices, and Patterns, Stephen Vance builds on all that’s been learned about test-driven development,...

Cryptography: Cracking Codes (Intelligence and Counterintelligence)
Cryptography: Cracking Codes (Intelligence and Counterintelligence)

While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryptionessentially the need to code information...

Professional WordPress: Design and Development
Professional WordPress: Design and Development

The highly praised resource returns with updated content, examples, and code downloads

WordPress is the most popular self-hosted open source website software in use today, and the latest version makes it even simpler to operate. Packed with real-world examples for load balancing and multiusers, this esteemed resource...

Pentaho Data Integration Beginner's Guide, Second Edition
Pentaho Data Integration Beginner's Guide, Second Edition

Get up and running with the Pentaho Data Integration tool using this hands-on, easy-to-read guide

Overview

  • Manipulate your data by exploring, transforming, validating, and integrating it
  • Learn to migrate data between applications
  • Explore several features of Pentaho Data...
Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c
Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c

Setting up a cloud environment is rarely smooth sailing but with this guide to Oracle Enterprise Manager Cloud Control, it just got a lot more manageable. Practical advice and lots of examples make it the ideal assistant.

Overview

  • Perform and set up your cloud environment one step at a time using this...
The Definitive Guide to Grails 2
The Definitive Guide to Grails 2

Grails is a full stack framework which aims to greatly simplify the task of building serious web applications for the JVM. The concepts within Grails, like interceptors, tag libs, and Groovy Server Pages (GSP), make those in the Java community feel right at home.

Grails’ foundation is on solid open source technologies such as...

Professional NFC Application Development for Android
Professional NFC Application Development for Android

A practical guide to developing and deploying Near Field Communication (NFC) applications

There has been little practical guidance available on NFC programming, until now. If you're a programmer or developer, get this unique and detailed book and start creating apps for this exciting technology. NFC enables contactless...

PHP Objects, Patterns, and Practice
PHP Objects, Patterns, and Practice

PHP Objects Patterns and Practice, Fourth Edition is revised and updated throughout.

The book begins by covering PHP's object-oriented features. It introduces key topics including class declaration, inheritance, reflection and much more. These provide the fundamentals of the PHP's support for objects. It also
...
Computability: Turing, Gödel, Church, and Beyond
Computability: Turing, Gödel, Church, and Beyond

In the 1930s a series of seminal works published by Alan Turing, Kurt Gödel, Alonzo Church, and others established the theoretical basis for computability. This work, advancing precise characterizations of effective, algorithmic computability, was the culmination of intensive investigations into the foundations of mathematics. In the...

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

Essential SharePoint® 2013: Practical Guidance for Meaningful Business Results (3rd Edition)
Essential SharePoint® 2013: Practical Guidance for Meaningful Business Results (3rd Edition)

The Only Book That’s 100% Focused on Maximizing the Business Value of SharePoint 2013

Essential SharePoint® 2013 approaches Microsoft SharePoint 2013 from a strict business value perspective, helping you plan and implement solutions that achieve effective business results.

...
Perl One-Liners: 130 Programs That Get Things Done
Perl One-Liners: 130 Programs That Get Things Done

Part of the fun of programming in Perl lies in tackling tedious tasks with short, efficient, and reusable code. Often, the perfect tool is the one-liner, a small but powerful program that fits in one line of code and does one thing really well.

In Perl One-Liners, author and impatient hacker Peteris
...

Result Page: Previous 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy