Bollywood 2010 | Martin Freeman | Literature Fiction
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Erlang: Software for a Concurrent World (Pragmatic Programmers)
Programming Erlang: Software for a Concurrent World (Pragmatic Programmers)

A multi-user game, web site, cloud application, or networked database can have thousands of users all interacting at the same time. You need a powerful, industrial-strength tool to handle the really hard problems inherent in parallel, concurrent environments. You need Erlang. In this second edition of the bestselling Programming...

Functional Programming Patterns in Scala and Clojure: Write Lean Programs for the JVM
Functional Programming Patterns in Scala and Clojure: Write Lean Programs for the JVM

Solve real-life programming problems with a fraction of the code that pure object-oriented programming requires. Use Scala and Clojure to solve in-depth problems with two sets of patterns: object-oriented patterns that become more concise with functional programming, and natively functional patterns. Your code will be more declarative, with...

Programming in Lua
Programming in Lua

Lua is the language of choice for anyone who needs a scripting language that is simple, efficient, extensible, portable, and free. Currently, Lua is being used in areas ranging from embedded systems to Web development and is widely spread in the game industry, where knowledge of Lua is an indisputable asset. Lua also has established itself as...

Learn to Program, Second Edition (The Facets of Ruby Series)
Learn to Program, Second Edition (The Facets of Ruby Series)

Printed in full color.

For this new edition of the best-selling Learn to Program, Chris Pine has taken a good thing and made it even better. First, he used the feedback from hundreds of reader e-mails to update the content and make it even clearer. Second, he updated the examples in the book to use the latest
...

Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

MEAN Blueprints
MEAN Blueprints

Key Features

  • Build six optimum end-to-end web applications using the M.E.A.N stack
  • Follow the advanced Angular.js 2 application structure to build more scalable and maintainable apps
  • Integrate an authorization system into your application and reuse existing code from projects
...
Open Source Identity Management Patterns and Practices Using OpenAM 10.x
Open Source Identity Management Patterns and Practices Using OpenAM 10.x

An intuitive guide to learning OpenAM access management capabilities for web and application servers

Overview

  • Learn patterns, practices, and the terminology of Identity Management
  • Learn how to install OpenAM 10.x
  • Protect web and application servers using policy agents
  • ...
Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
The Healthy Programmer: Get Fit, Feel Better, and Keep Coding (Pragmatic Programmers)
The Healthy Programmer: Get Fit, Feel Better, and Keep Coding (Pragmatic Programmers)

Printed in full color.

To keep doing what you love, you need to maintain your own systems, not just the ones you write code for. Regular exercise and proper nutrition help you learn, remember, concentrate, and be creative--skills critical to doing your job well. Learn how to change your work habits, master exercises
...

Using SQLite
Using SQLite

Application developers, take note: databases aren't just for the IS group any more. You can build database-backed applications for the desktop, Web, embedded systems, or operating systems without linking to heavy-duty client-server databases such as Oracle and MySQL. This book shows you how to use SQLite, a small and lightweight...

BeagleBone Essentials
BeagleBone Essentials

Harness the power of the BeagleBone Black to manage external environments using C, Bash, and Python/PHP programming

About This Book

  • Learn the fundamentals of Beaglebone Black via a detailed tutorial that provides practical examples, from initial board setup to device driver management
  • ...
BeagleBone for Secret Agents
BeagleBone for Secret Agents

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • ...
Result Page: 189 188 187 186 185 184 183 182 181 180 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy