Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Definitive Guide to MongoDB: A complete guide to dealing with Big Data using MongoDB
The Definitive Guide to MongoDB: A complete guide to dealing with Big Data using MongoDB

The Definitive Guide to MongoDB, Second Edition, is updated for the latest version and includes all of the latest MongoDB features, including the aggregation framework introduced in version 2.2 and hashed indexes in version 2.4. MongoDB is the most popular of the "Big Data" NoSQL database technologies, and it's still growing....

OAuth 2.0 Identity and Access Management Patterns
OAuth 2.0 Identity and Access Management Patterns

Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.

Overview

  • Build web, client-side, desktop, and server-side...
PMP Training Kit
PMP Training Kit

Your 2-in-1 Self-Paced Training Kit:

Ace your preparation for the skills measured by the updated PMP Exam, aligned with the Guide to the Project Management Body of Knowledge (PMBOK® Guide), Fifth Edition. Work at your own pace through a series of lessons and reviews that fully cover each exam task. Then,...

Executable Specifications with Scrum: A Practical Guide to Agile Requirements Discovery
Executable Specifications with Scrum: A Practical Guide to Agile Requirements Discovery

Most books about specifications still assume that requirements can be known up front and won’t change much during your project. In today’s “real world,” however, you must specify and build software in the face of high and continuing uncertainty. Scrum and other agile methods have evolved to reflect this reality. Now,...

Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

Probability and Statistics for Computer Scientists
Probability and Statistics for Computer Scientists

Student-Friendly Coverage of Probability, Statistical Methods, Simulation, and Modeling Tools
Incorporating feedback from instructors and researchers who used the previous edition, Probability and Statistics for Computer Scientists, Second Edition helps students understand general methods of stochastic
...

The Definitive ANTLR 4 Reference
The Definitive ANTLR 4 Reference

Programmers run into parsing problems all the time. Whether it's a data format like JSON, a network protocol like SMTP, a server configuration file for Apache, a PostScript/PDF file, or a simple spreadsheet macro language--ANTLR v4 and this book will demystify the process. ANTLR v4 has been rewritten from scratch to make it...

Practical Data Analysis
Practical Data Analysis

Transform, model, and visualize your data through hands-on projects, developed in open source tools

Overview

  • Explore how to analyze your data in various innovative ways and turn them into insight
  • Learn to use the D3.js visualization tool for exploratory data analysis
  • ...
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists
Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists

Bring your electronic inventions to life!

"This full-color book is impressive...there are some really fun projects!" -GeekDad, Wired.com

Who needs an electrical engineering degree? This intuitive guide shows how to wire, disassemble, tweak, and re-purpose everyday devices quickly and easily. Packed with...

Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Graphical models (e.g., Bayesian and constraint networks, influence diagrams, and Markov decision processes) have become a central paradigm for knowledge representation and reasoning in both artificial intelligence and computer science in general. These models are used to perform many reasoning tasks, such as scheduling, planning and...

Result Page: Previous 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy