The Age of Shadows (2016) Neue link: 2017/08/19 Views: 3006 Länge: 140 min IMDB rating: 7.2 Uploaded: 2017/08/02 The Age of Shadows 2016 | Kaya Scodelario | ZAYN Taylor Swift
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Testing Python: Applying Unit Testing, TDD, BDD and Acceptance Testing
Testing Python: Applying Unit Testing, TDD, BDD and Acceptance Testing

Fundamental testing methodologies applied to the popular Pythonlanguage

Testing Python; Applying Unit Testing, TDD, BDD andAcceptance Testing is the most comprehensive book available ontesting for one of the top software programming languages in theworld. Python is a natural choice for new and experienceddevelopers,...

Unity Game Development Blueprints
Unity Game Development Blueprints

Explore the various enticing features of Unity and learn how to develop awesome games

About This Book

  • Create a wide variety of projects with Unity in multiple genres and formats
  • Complete art assets with clear step-by-step examples and instructions to complete all tasks using Unity, C#,...
Windows Store App Development: C# and XAML
Windows Store App Development: C# and XAML

Summary

Windows Store App Development introduces C# developers to working with Windows Store apps. It provides full coverage of XAML, and addresses both app design and development. Following numerous carefully crafted examples, you'll learn about new Windows 8 features, the WinRT API, and .NET 4.5....

The Mathematics of Games and Gambling (Mathematical Association of America Textbooks)
The Mathematics of Games and Gambling (Mathematical Association of America Textbooks)
'The whole book is written with great urbanity and clarity ... it is hard to see how it could have been better or more readable.' The Mathematical Gazette

You can't lose with this MAA Book Prize winner if you want to see how mathematics can be used to analyze games of chance and skill. Roulette, craps, blackjack, backgammon,
...
Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Understanding Tcp/ip: A Clear And Comprehensive Guide
Understanding Tcp/ip: A Clear And Comprehensive Guide
This book covers in detail the Open System Interconnection (OSI) reference model and the TCP/IP protocols that operate that different layers. Its coverage includes various application protocols. The authors explain in an easy-to-read style networking concepts and protocols, with examples that make the book a practical guide in addition to its...
Geographic Information Systems in Business
Geographic Information Systems in Business
This book contains state-of-the-art research studies on the concepts, theory, processes, and real world applications of geographical information systems (GIS) in business. Its chapters are authored by many of the leading experts in applying GIS and geospatial science to business. The book utilizes a wide variety of approaches and methodologies...
Manuscript Verse Collectors and the Politics of Anti-Courtly Love Poetry
Manuscript Verse Collectors and the Politics of Anti-Courtly Love Poetry
This book reappraises the work of early-seventeenth-century collectors of English Renaissance poetry in manuscript. The verse miscellanies, or poetry anthologies, of these collectors have long attracted the attention of literary editors looking for texts by individual, major authors, and they have more recently interested historians for their poems...
Graph Databases
Graph Databases
Graph databases address one of the great macroscopic business trends of today: leveraging complex and dynamic relationships in highly connected data to generate insight and competitive advantage. Whether we want to understand relationships between customers, elements in a telephone or data center network, entertainment...
Security and Software for Cybercafes (Premier Reference Source)
Security and Software for Cybercafes (Premier Reference Source)
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information,...
Metaprogramming in .NET
Metaprogramming in .NET

Summary

Metaprogramming in .NET is designed to help readers understand the basic concepts, advantages, and potential pitfalls of metaprogramming. It introduces core concepts in clear, easy-to-follow language and then it takes you on a deep dive into the tools and techniques you'll use to implement them...

Pro Freeware and Open Source Solutions for Business
Pro Freeware and Open Source Solutions for Business

Pro Freeware and Open Source Solutions for Business is a practical guide for the small business owner seeking viable alternative to expensive commercial software packages and subscriptions. This comprehensive look at the powerful alternatives to expensive proprietary software provides an illustrated overview of no-cost software...

Result Page: 17 16 15 14 13 12 11 10 9 8 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy