One Piece Chapter 839: | Re: Zero - Starting Life in Another World (Cantonese) - 從零開始的異世界生活 - Episode 08 | Nanny Killer HD
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Project Management Checklists For Dummies
Project Management Checklists For Dummies

Your must-have tool for perfect project management

Want to take your career to the next level and be a master of planning, organising, motivating and controlling resources to meet your goals? This easy-to-use guide has you covered! Project Management Checklists For Dummies takes the intimidation out of project...

Technical Blogging: Turn Your Expertise into a Remarkable Online Presence
Technical Blogging: Turn Your Expertise into a Remarkable Online Presence

Technical Blogging is the first book to specifically teach programmers, technical people, and technically-oriented entrepreneurs how to become successful bloggers. There is no magic to successful blogging; with this book you'll learn the techniques to attract and keep a large audience of loyal, regular readers and leverage this...

Beginning Spring Boot 2: Applications and Microservices with the Spring Framework
Beginning Spring Boot 2: Applications and Microservices with the Spring Framework

Learn Spring Boot and how to build Java-based enterprise, web, and microservice applications with it. In this book, you'll see how to work with relational and NoSQL databases, build your first microservice, enterprise, or web application, and enhance that application with REST APIs. You'll also learn how to build reactive web...

Unreal Engine 4 Game Development Essentials
Unreal Engine 4 Game Development Essentials

Key Features

  • Get to grips with the user interface of Unreal Engine 4 and find out more about its various robust features
  • Create dream video games with the help of the different tools Unreal Engine 4 offers
  • Create video-games and fully utilize the power of Unreal Engine 4 to bring games to...
Linux Server Security: Hack and Defend
Linux Server Security: Hack and Defend

Learn how to attack and defend the world’s most popular web server platform

Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server...

Developing Analytic Talent: Becoming a Data Scientist
Developing Analytic Talent: Becoming a Data Scientist

Learn what it takes to succeed in the the most in-demand tech job

Harvard Business Review calls it the sexiest tech job of the 21st century. Data scientists are in demand, and this unique book shows you exactly what employers want and the skill set that separates the quality data scientist from other talented IT...

Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Introducing Data Science: Big Data, Machine Learning, and more, using Python tools
Introducing Data Science: Big Data, Machine Learning, and more, using Python tools

Summary

Introducing Data Science teaches you how to accomplish the fundamental tasks that occupy data scientists. Using the Python language and common Python libraries, you'll experience firsthand the challenges of dealing with data at scale and gain a solid foundation in data science.

...

Programming Logics: Essays in Memory of Harald Ganzinger (Lecture Notes in Computer Science)
Programming Logics: Essays in Memory of Harald Ganzinger (Lecture Notes in Computer Science)

This Festschrift volume, published in memory of Harald Ganzinger, contains 17 papers from colleagues all over the world and covers all the fields to which Harald Ganzinger dedicated his work during his academic career. The volume begins with a complete account of Harald Ganzinger's work and then turns its focus to the research of his...

Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Building Embedded Systems: Programmable Hardware
Building Embedded Systems: Programmable Hardware
 This is a book about developing the software and hardware you never think about. We're talking about the nitty-gritty behind the buttons on your microwave, inside your thermostat, inside the keyboard used to type this description, and even running the monitor on which you are reading it now. Such stuff is termed embedded systems,...
The Google Resume: How to Prepare for a Career and Land a Job at Apple, Microsoft, Google, or any Top Tech Company
The Google Resume: How to Prepare for a Career and Land a Job at Apple, Microsoft, Google, or any Top Tech Company

Just so you’re clear: it was not my idea to give a talk to Microsoft Research. I had learned embarrassingly little about computer science in my 18 years of life, and the last thing I wanted to do is to have that exposed in front of a bunch of genius PhDs in MSR. But my manager thought it’d be a great...

Result Page: 112 111 110 109 108 107 106 105 104 103 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy