Daddy Cool - 逆緣 - Episode 35 [END] (Completed) | Chef's Table | Silvesterlaune The Limo
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Programming with Python For Dummies (For Dummies Series)
Beginning Programming with Python For Dummies (For Dummies Series)

Learn Python—the fun and easy way—and get in the programming game today!

Python is one of the fastest growing programming languages, and no wonder. It requires three to five times less time than developing in Java, is a great building block for learning both procedural and object-oriented programming concepts,...

Software Testing: Concepts and Operations (Quantitative Software Engineering Series)
Software Testing: Concepts and Operations (Quantitative Software Engineering Series)

Explores and identifies the main issues, concepts, principles and evolution of software testing, including software quality engineering and testing concepts, test data generation, test deployment analysis, and software test management

This book examines the principles, concepts, and processes that are fundamental to
...

Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Multiplayer Game Programming: Architecting Networked Games (Game Design)
Multiplayer Game Programming: Architecting Networked Games (Game Design)
Networked multiplayer games are a huge part of the games industry today. The number of players and amount of money involved are staggering. As of 2014, League of Legends boasts 67 million active players each month. The 2015 DoTA 2 world championship has a prize pool of over $16 million at the time of writing. The Call of Duty series,...
The Art of Computer Programming, Vol. 1: Fundamental Algorithms, 3rd Edition
The Art of Computer Programming, Vol. 1: Fundamental Algorithms, 3rd Edition

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.

Byte, September 1995

 

I can't begin to tell you how many pleasurable...

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Excel VBA 24-Hour Trainer
Excel VBA 24-Hour Trainer

Increase your productivity and save time and effort with Excel VBA

This unique book-and-DVD package prepares you to get more out of Excel by using Visual Basic for Applications (VBA) to automate your routine or labor-intensive Excel tasks. Microsoft Excel MVP and author Tom Urtis walks through a series of lessons while the...

Fundamentals of Convolutional Coding (IEEE Series on Digital & Mobile Communication)
Fundamentals of Convolutional Coding (IEEE Series on Digital & Mobile Communication)

Fundamentals of Convolutional Coding, Second Edition, regarded as a bible of convolutional coding brings you a clear and comprehensive discussion of the basic principles of this field

  • Two new chapters on low-density parity-check (LDPC) convolutional codes and iterative coding
  • Viterbi, BCJR, BEAST,...
CentOS 6 Linux Server Cookbook
CentOS 6 Linux Server Cookbook

An all-in-one guide to installing, configuring, and running a Centos 6 server. Ideal for newbies and old-hands alike, this practical tutorial ensures you get the best from this popular, enterprise-class free server solution.

  • Delivering comprehensive insight into CentOS server with a series of starting points that show you...
Microsoft Word 2010: Illustrated Complete (Illustrated Series: Individual Office Applications)
Microsoft Word 2010: Illustrated Complete (Illustrated Series: Individual Office Applications)

Loved by instructors for its visual and flexible way to build computer skills, the Illustrated Series is ideal for teaching Microsoft Office Word 2010 to both computer rookies and hotshots. Each two-page spread focuses on a single skill, making information easy to follow and absorb. Large, full-color illustrations represent how the...

The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)
The Scrum Field Guide: Agile Advice for Your First Year and Beyond (2nd Edition)

Extensively revised to reflect improved Scrum practices and tools, this edition adds an all-new section of tips from the field. 



The 1st Edition has a 5-Star Amazon Customer Rating and 135 reviews.

Thousands of organizations are adopting Scrum to
...
Result Page: 366 365 364 363 362 361 360 359 358 357 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy