CyberLink PowerDVD Ultra 18 0 1619 62 Pre Cracked [CracksNow] | Gwiezdne Wojny: Wojny Klonó... | Más detalles
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
An Introduction to Network Programming with Java: Java 7 Compatible
An Introduction to Network Programming with Java: Java 7 Compatible

Since the second edition of this text, the use of the Internet and networks generally has continued to expand at a phenomenal rate. This has led to both an increase in demand for network software and to improvements in the technology used to run such networks, with the latter naturally leading to changes in the former. During this time, the...

Program Management for Improved Business Results
Program Management for Improved Business Results

Superior program management begins with superior information and strategy

Program Management for Improved Business Results, Second Edition is a practical guide to real-world program management, written to align with the rigorous PMI® PgMP® certification standards. The book explains the benchmarks and best...

Practical Data Science Cookbook - Second Edition
Practical Data Science Cookbook - Second Edition

Over 85 recipes to help you complete real-world data science projects in R and Python

About This Book

  • Tackle every step in the data science pipeline and use it to acquire, clean, analyze, and visualize your data
  • Get beyond the theory and implement real-world projects in data science using...
php|architect's Guide to Web Scraping
php|architect's Guide to Web Scraping

Today , there aremany services out there providing news feeds, and there are plenty of code libraries that can parse this data. So, with the proliferation of web services and public APIs, why is web scraping still so important to the future of the Web? It is important because of the rise ofmicroformats, Semantic Web technologies, theW3C...

The Weed Runners: Travels with the Outlaw Capitalists of America's Medical Marijuana Trade
The Weed Runners: Travels with the Outlaw Capitalists of America's Medical Marijuana Trade


Make no mistake: the US government’s hundred-year-old war on marijuana isn’t over. Some 20 million Americans have been arrested on marijuana charges so far. The American marijuana industry remains underground, where modern-day moonshiners who view themselves as...

Real-Time Visual Effects for Game Programming (Gaming Media and Social Effects)
Real-Time Visual Effects for Game Programming (Gaming Media and Social Effects)

This book introduces the latest visual effects (VFX) techniques that can be applied to game programming. The usefulness of the physicality-based VFX techniques, such as water, fire, smoke, and wind, has been proven through active involvement and utilization in movies and images. However, they have yet to be extensively applied in the game...

Beginning SQL Server Reporting Services
Beginning SQL Server Reporting Services

Learn SQL Server Reporting Services and become current with the 2016 edition. Develop interactive, dynamic reports that combine graphs, charts, and tabular data into attractive dashboards and reports to delight business analysts and other users of corporate data. Deliver mobile reports to anywhere and any device. Build vital...

Scala Functional Programming Patterns
Scala Functional Programming Patterns

Grok and perform effective functional programming in Scala

About This Book

  • Understand functional programming patterns by comparing them with the traditional object-oriented design patterns
  • Write robust, safer, and better code using the declarative programming paradigm
  • An...
CEH v9: Certified Ethical Hacker Version 9 Study Guide
CEH v9: Certified Ethical Hacker Version 9 Study Guide

The ultimate preparation guide for the unique CEH exam.

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Statistical Bioinformatics: with R
Statistical Bioinformatics: with R

Bioinformatics is an emerging field in which statistical and computational techniques are used extensively to analyze and interpret biological data obtained from high-throughput genomic technologies. Genomic technologies allow us to monitor thousands of biological processes going on inside living organisms in one snapshot, and are...

The Passionate Programmer: Creating a Remarkable Career in Software Development (Pragmatic Life)
The Passionate Programmer: Creating a Remarkable Career in Software Development (Pragmatic Life)
Success in today's IT environment requires you to view your career as a business endeavor. In this book, you'll learn how to become an entrepreneur, driving your career in the direction of your choosing. You'll learn how to build your software development career step by step, following the same path that you would follow if you were building,...
Result Page: 69 68 67 66 65 64 63 62 61 60 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy