Все книги жанра зарубежная компьютерная литература - Страница 42
Фильтровать по
Язык
Источник
Тип
Возрастные ограничения
Quantum Physics for Scientists and Technologists. Fundamental Principl...
Quantum Physics for Scientists and Technologists. Fundamental Principles and Applications for Biologists, Chemists, Computer Scientists, and Nanotechnologists
Quantum Physics for Scientists and Technologists is a self-contained, comprehensive review of this c...
Where Code and Content Meet. Design Patterns for Web Content Managemen...
Where Code and Content Meet. Design Patterns for Web Content Management and Delivery, Personalisation and User Participation
A practical go-to reference for Web developers programming custom software for Web sites Most advanc...
Adapting Configuration Management for Agile Teams. Balancing Sustainab...
Adapting Configuration Management for Agile Teams. Balancing Sustainability and Speed
Adapting Configuration Management for Agile Teams provides very tangible approaches on how Configura...
Assembly Language Programming. ARM Cortex-M3
Assembly Language Programming. ARM Cortex-M3
ARM designs the cores of microcontrollers which equip most “embedded systems” based on 32-bit proces...
Public Key Cryptography. Applications and Attacks
Public Key Cryptography. Applications and Attacks
Complete coverage of the current major public key cryptosystems their underlying mathematics and the...
Complex-Valued Neural Networks. Advances and Applications
Complex-Valued Neural Networks. Advances and Applications
Presents the latest advances in complex-valued neural networks by demonstrating the theory in a wide...
Oracle Database Performance and Scalability. A Quantitative Approach
Oracle Database Performance and Scalability. A Quantitative Approach
The innovative performance and scalability features with each newer edition of the Oracle database s...
Agile: оценка и планирование проектов
Agile: оценка и планирование проектов
Оценка и планирование критически важны для успеха любого проекта. Однако процесс планирования сложен...
Изучаем Python. Программирование игр, визуализация данных, веб-приложе...
Изучаем Python. Программирование игр, визуализация данных, веб-приложения (pdf+epub)
«Изучаем Python» – это самое популярное в мире руководство по языку Python. Вы сможете не только мак...
Профессиональная разработка сайтов на Drupal 7
Профессиональная разработка сайтов на Drupal 7
Эта книга представляет собой наиболее полное руководство по CMS Drupal 7, подготовленное силами сооб...
Reversing. Secrets of Reverse Engineering
Reversing. Secrets of Reverse Engineering
Beginning with a basic primer on reverse engineering-including computer internals, operating systems...
AutoCAD. Secrets Every User Should Know
AutoCAD. Secrets Every User Should Know
"I've been using AutoCAD for 22 years and have written a hundred books on the subject. I reviewed ma...
Unauthorised Access. Physical Penetration Testing For IT Security Team...
Unauthorised Access. Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security M...
Java Enterprise Design Patterns. Patterns in Java
Java Enterprise Design Patterns. Patterns in Java
A how-to guide for Java programmers who want to use design patterns when developing real-world enter...
Architecting Enterprise Solutions. Patterns for High-Capability Intern...
Architecting Enterprise Solutions. Patterns for High-Capability Internet-based Systems
A practical, nuts-and-bolts guide to architectural solutions that describes step-by-step how to desi...
Web 2.0 Heroes. Interviews with 20 Web 2.0 Influencers
Web 2.0 Heroes. Interviews with 20 Web 2.0 Influencers
Web 2.0 may be an elusive concept, but one thing is certain: using the Web as merely a means of retr...
Hack Attacks Testing. How to Conduct Your Own Security Audit
Hack Attacks Testing. How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations A netw...
Malicious Cryptography. Exposing Cryptovirology
Malicious Cryptography. Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses,...
UNIX Filesystems. Evolution, Design, and Implementation
UNIX Filesystems. Evolution, Design, and Implementation
Covers all versions of UNIX, as well as Linux, operating systems that are used by the majority of Fo...
Effective GUI Testing Automation. Developing an Automated GUI Testing...
Effective GUI Testing Automation. Developing an Automated GUI Testing Tool
Have you tried using an «automated» GUI testing tool, only to find that you spent most of your time...
Linux Security. Craig Hunt Linux Library
Linux Security. Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators Thi...
Managing Open Source Projects. A Wiley Tech Brief
Managing Open Source Projects. A Wiley Tech Brief
The only guide to managing and integrating the open source model With the phenomenal success of Linu...
Building B2B Applications with XML. A Resource Guide
Building B2B Applications with XML. A Resource Guide
What every IT manager and system administrator needs to know about the technology that drives the B2...
Hack Attacks Revealed. A Complete Reference with Custom Security Hacki...
Hack Attacks Revealed. A Complete Reference with Custom Security Hacking Toolkit
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashe...
BSD UNIX Toolbox. 1000+ Commands for FreeBSD, OpenBSD and NetBSD
BSD UNIX Toolbox. 1000+ Commands for FreeBSD, OpenBSD and NetBSD
Learn how to use BSD UNIX systems from the command line with BSD UNIX Toolbox: 1000+ Commands for Fr...
Java Foundations
Java Foundations
The world of IT is always evolving, but in every area there are stable, core concepts that anyone ju...
Beginning SQL
Beginning SQL
Taking readers through the basics of the language, right up to some more advanced topics, this book...
Beginning Algorithms
Beginning Algorithms
Beginning Algorithms A good understanding of algorithms, and the knowledge of when to apply them, is...
MacBook For Dummies
MacBook For Dummies
Get the most out of your MacBook Your new MacBook is sleek and powerful, and this down-to-earth guid...
Mastering Delphi 6
Mastering Delphi 6
Still the Best Delphi Resource A Fully Revised Version of the Book That Won the Delphi Informant Rea...
TCP/IP Foundations
TCP/IP Foundations
The world of IT is always evolving, but in every area there are stable, core concepts that anyone ju...
C# Network Programming
C# Network Programming
On its own, C# simplifies network programming. Combine it with the precise instruction found in C# N...
XML For Dummies
XML For Dummies
See how XML works for business needs and RSS feeds Create consistency on the Web, or tag your data f...
Eclipse For Dummies
Eclipse For Dummies
In his friendly, easy-to-understand style, the bestselling author of Java 2 For Dummies shows develo...
Professional Assembly Language
Professional Assembly Language
Unlike high-level languages such as Java and C++, assembly language is much closer to the machine co...
Content Management Bible
Content Management Bible
Written by one of the leading experts in content management systems (CMS), this newly revised bestse...
GarageBand For Dummies
GarageBand For Dummies
Get ready to rock with Apple's digital music recording studio Find out how to record, edit, mix, and...
C For Dummies
C For Dummies
while (dead_horse) beat (): If you’re like most people, the above seems like nonsense. Actually, it’...
iPAQ For Dummies
iPAQ For Dummies
With an iPAQ in your pocket, you have a whole world of technology literally at your fingertips. The...