Fear Itself | Софт для iPhone, iPod, iPad | Sasan Behroozian
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Clojure for the Brave and True: Learn the Ultimate Language and Become a Better Programmer
Clojure for the Brave and True: Learn the Ultimate Language and Become a Better Programmer

For weeks, months—nay!—from the very moment you were born, you’ve felt it calling to you. At long last you’ll be united with the programming language you’ve been longing for: Clojure!

As a Lisp-style functional programming language, Clojure lets you write robust and elegant code, and because it
...

Design Patterns: Elements of Reusable Object-Oriented Software
Design Patterns: Elements of Reusable Object-Oriented Software

Capturing a wealth of experience about the design of object-oriented software, four top-notch designers present a catalog of simple and succinct solutions to commonly occurring design problems. Previously undocumented, these 23 patterns allow designers to create more flexible, elegant, and ultimately reusable designs without having to...

Packet Guide to Core Network Protocols
Packet Guide to Core Network Protocols

Trying to find the perfect networking resource or textbook can be a real challenge. Sometimes they are extremely focused on one technology, and thus miss the mark. Or they are extremely broad, covering every networking idea known to man. This book is about something that all networks have in common—the core protocols. Networks...

Misunderstanding the Internet (Communication and Society)
Misunderstanding the Internet (Communication and Society)

The growth of the internet has been spectacular. There are now more 1.5 billion internet users across the globe, about one quarter of the world’s population. This is certainly a new phenomenon that is of enormous significance for the economic, political and social life of contemporary societies.

However, much popular and...

Introducing Linux Distros
Introducing Linux Distros

Learn the pros and the cons of the most frequently used distros in order to find the one that is right for you. You will explore each distro step by step, so that you don't have to endure hours of web surfing, countless downloads, becoming confused by new concepts and, in the worst cases, reading complex and marathon installation guides....

The Art of UNIX Programming
The Art of UNIX Programming

"Reading this book has filled a gap in my education. I feel a sense of completion, understand that UNIX is really a style of community. Now I get it, at least I get it one level deeper than I ever did before. This book came at a perfect moment for me, a moment when I shifted from visualizing programs as things to programs as...

Gene Expression Programming: Mathematical Modeling by an Artificial Intelligence (Studies in Computational Intelligence)
Gene Expression Programming: Mathematical Modeling by an Artificial Intelligence (Studies in Computational Intelligence)
The idea for this second edition came from Janusz Kacprzyk on April 29, 2005, who kindly invited me to his new Springer series, Studies in Computational Intelligence. The initial plan was to correct the usual typos and mistakes but leave the book unchanged, as Janusz thought (and I agreed with him) that it was the proper moment...
Optical Switching  and Networking Handbook
Optical Switching and Networking Handbook
Before you begin to read this book, please take a moment to read these introductory comments. The title of the book may be misleading for many people:

For the engineering person, this may sound like the bible of optical networks and switching systems. Not so! This is not an engineering book and will not dig into the gory details of bits
...
Mobile JavaScript Application Development: Bringing Web Programming to Mobile Devices
Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Genetic Programming Theory and Practice IV (Genetic and Evolutionary Computation)
Genetic Programming Theory and Practice IV (Genetic and Evolutionary Computation)
Genetic Programming Theory and Practice IV was developed from the fourth workshop at the University of Michigan’s Center for the Study of Complex Systems to facilitate the exchange of ideas and information related to the rapidly advancing field of Genetic Programming (GP). Contributions from the foremost international...
Inventors at Work: The Minds and Motivation Behind Modern Inventions
Inventors at Work: The Minds and Motivation Behind Modern Inventions

Inventors at Work: The Minds and Motivation Behind Modern Inventions is a collection of interviews with inventors of famous products, innovations, and technologies that have made life easier or even changed the way we live. All of these scientists, engineers, wild-eyed geniuses, and amateur technologists have dedicated their...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy