bannerbanner
ЗарубежныеРусскиеВсе

программирование

Beginning Visual C# 2010
0
Update to Wrox's leading C# book for beginners Get ready for the next release of Microsoft's C# programming language with this essential Wrox beginner's guide. Beginning Microsoft Visual C# 2010 starts with the basics and brings you thoroughly up to …
Update to Wrox's leading C# book for beginners Get ready for the next release of Microsoft's C# programming language with this essential Wrox beginner's guide. Beginning Microsoft Visual C# 2010 starts with the basics and brings you thoroughly up to …
Profit From Your Forecasting Software
0
Go beyond technique to master the difficult judgement calls of forecasting A variety of software can be used effectively to achieve accurate forecasting, but no software can replace the essential human component. You may be new to forecasting, or you…
Go beyond technique to master the difficult judgement calls of forecasting A variety of software can be used effectively to achieve accurate forecasting, but no software can replace the essential human component. You may be new to forecasting, or you…
Mastering Unix Shell Scripting
0
UNIX expert Randal K. Michael guides you through every detail of writing shell scripts to automate specific tasks. Each chapter begins with a typical, everyday UNIX challenge, then shows you how to take basic syntax and turn it into a shell scripting…
UNIX expert Randal K. Michael guides you through every detail of writing shell scripts to automate specific tasks. Each chapter begins with a typical, everyday UNIX challenge, then shows you how to take basic syntax and turn it into a shell scripting…
TensorFlow For Dummies
0
Become a machine learning pro! Google TensorFlow has become the darling of financial firms and research organizations, but the technology can be intimidating and the learning curve is steep. Luckily, TensorFlow For Dummies is here to offer you a frie…
Become a machine learning pro! Google TensorFlow has become the darling of financial firms and research organizations, but the technology can be intimidating and the learning curve is steep. Luckily, TensorFlow For Dummies is here to offer you a frie…
Mastering AutoCAD 2019 and AutoCAD LT 2019
0
The world’s favorite guide to everything AutoCAD and AutoCAD LT—updated for 2019! Mastering AutoCAD 2019 and AutoCAD LT 2019 is the world’s all-time best-selling guide to the world’s most popular drafting software. Packed with tips, tricks, technique…
The world’s favorite guide to everything AutoCAD and AutoCAD LT—updated for 2019! Mastering AutoCAD 2019 and AutoCAD LT 2019 is the world’s all-time best-selling guide to the world’s most popular drafting software. Packed with tips, tricks, technique…
Changing Software Development
0
Changing Software Development explains why software development is an exercise in change management and organizational intelligence. An underlying belief is that change is learning and learning creates knowledge. By blending the theory of knowledge m…
Changing Software Development explains why software development is an exercise in change management and organizational intelligence. An underlying belief is that change is learning and learning creates knowledge. By blending the theory of knowledge m…
Adobe Photoshop CS6 Bible
0
The comprehensive, soup-to-nuts guide to Photoshop, fully updated Photoshop CS6, used for both print and digital media, is the industry leader in image-editing software. The newest version adds some exciting new features, and this bestselling guide h…
The comprehensive, soup-to-nuts guide to Photoshop, fully updated Photoshop CS6, used for both print and digital media, is the industry leader in image-editing software. The newest version adds some exciting new features, and this bestselling guide h…
Windows Security Monitoring
0
Go deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Micr…
Go deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Micr…
Network Query Language (NQL)
0
An unparalleled opportunity to learn about an exciting new technology that is revolutionizing network and Internet content delivery Network Query Language (NQL) is a revolutionary new scripting language that makes it astonishingly quick and easy to a…
An unparalleled opportunity to learn about an exciting new technology that is revolutionizing network and Internet content delivery Network Query Language (NQL) is a revolutionary new scripting language that makes it astonishingly quick and easy to a…
Amazon Web Services for Mobile Developers
0
A practical, real-world introduction to AWS tools and concepts Amazon Web Services for Mobile Developers: Building Apps with AWS presents a professional view of cloud computing and AWS for experienced iOS/Android developers and technical/solution arc…
A practical, real-world introduction to AWS tools and concepts Amazon Web Services for Mobile Developers: Building Apps with AWS presents a professional view of cloud computing and AWS for experienced iOS/Android developers and technical/solution arc…
Being Virtual
0
Thanks to the Internet, it has never been so easy to become the person of your wildest dreams. Immersive 3D worlds such as Second Life and THERE.com provide an escape route from the ordinary, into a virtual world where you have the power to mould you…
Thanks to the Internet, it has never been so easy to become the person of your wildest dreams. Immersive 3D worlds such as Second Life and THERE.com provide an escape route from the ordinary, into a virtual world where you have the power to mould you…
Unstructured Data Analytics
0
Turn unstructured data into valuable business insight Unstructured Data Analytics provides an accessible, non-technical introduction to the analysis of unstructured data. Written by global experts in the analytics space, this book presents unstructur…
Turn unstructured data into valuable business insight Unstructured Data Analytics provides an accessible, non-technical introduction to the analysis of unstructured data. Written by global experts in the analytics space, this book presents unstructur…
iPhone SDK 3 Programming
0
Get the expert guidance you need to begin building native applications for Apple's new iPhone 3G as well as the iPod Touch Apple's iPhone is the hottest mobile device on the planet. More than one million iPhone 3G phones were sold in the first three …
Get the expert guidance you need to begin building native applications for Apple's new iPhone 3G as well as the iPod Touch Apple's iPhone is the hottest mobile device on the planet. More than one million iPhone 3G phones were sold in the first three …
Large-Scale Software Architecture
0
The purpose of large-scale software architecture is to capture and describe practical representations to make development teams more effective. In this book the authors show how to utilise software architecture as a tool to guide the development inst…
The purpose of large-scale software architecture is to capture and describe practical representations to make development teams more effective. In this book the authors show how to utilise software architecture as a tool to guide the development inst…
Scenarios, Stories, Use Cases
0
Extending the scenario method beyond interface design, this important book shows developers how to design more effective systems by soliciting, analyzing, and elaborating stories from end-users Contributions from leading industry consultants and opin…
Extending the scenario method beyond interface design, this important book shows developers how to design more effective systems by soliciting, analyzing, and elaborating stories from end-users Contributions from leading industry consultants and opin…
Computer Architecture and Security. Fundamentals of Designing Secure Computer Systems
0
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system s…
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system s…
Distributed Database Management Systems. A Practical Approach
0
This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory and current research, explaining the difficulties in providing a unified user interface and global da…
This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory and current research, explaining the difficulties in providing a unified user interface and global da…
Harnessing Green IT. Principles and Practices
0
“Ultimately, this is a remarkable book, a practical testimonial, and a comprehensive bibliography rolled into one. It is a single, bright sword cut across the various murky green IT topics. And if my mistakes and lessons learned through the green IT …
“Ultimately, this is a remarkable book, a practical testimonial, and a comprehensive bibliography rolled into one. It is a single, bright sword cut across the various murky green IT topics. And if my mistakes and lessons learned through the green IT …
Developments in Data Storage. Materials Perspective
0
A timely text on the recent developments in data storage, from a materials perspective Ever-increasing amounts of data storage on hard disk have been made possible largely due to the immense technological advances in the field of data storage materia…
A timely text on the recent developments in data storage, from a materials perspective Ever-increasing amounts of data storage on hard disk have been made possible largely due to the immense technological advances in the field of data storage materia…
Bistatic SAR / ISAR / FSR. Theory Algorithms and Program Implementation
0
Bistatic radar consists of a radar system which comprises a transmitter and receiver which are separated by a distance comparable to the expected target distance. This book provides a general theoretical description of such bistatic technology in the…
Bistatic radar consists of a radar system which comprises a transmitter and receiver which are separated by a distance comparable to the expected target distance. This book provides a general theoretical description of such bistatic technology in the…

Популярные авторы