|
|
C: From Theory to Practice
Designed for a compulsory fundamental course, C: From Theory to Practice uses a hands-on approach to teach the C programming language, using numerous examples and a clear, concise presentation. Easy to use and classroom tested, this textbook includes more than 500 exercises and examples of progressive difficulty to help students in... | | Use of Force: A Thriller (The Scot Harvath Series)
“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy
From #1 New York Times bestselling author Brad Thor.
As a storm rages across the Mediterranean Sea, a... | | Introduction to DevOps with Chocolate, LEGO and Scrum Game
Discover a role-based simulation game designed to introduce DevOps in a very unusual way. Working with LEGO and chocolate, using avatars, personas, and role cards, you will gain an understanding of the Dev and Ops roles as well as their interdependencies. Throughout the game, players go through a range of emotions and learn to expand... |
|
|
Node.js the Right Way: Practical, Server-Side JavaScript That Scales
Get to the forefront of server-side JavaScript programming by writing compact, robust, fast, networked Node applications that scale. Ready to take JavaScript beyond the browser, explore dynamic languages features and embrace evented programming? Explore the fun, growing repository of Node modules provided by npm. Work with multiple protocols,... | | Elasticsearch: A Complete Guide
End-to-end Search and Analytics
About This Book
-
Solve your data analytics problems with the Elastic Stack
-
Improve your user search experience with Elasticsearch and develop your own Elasticsearch plugins
-
Design your index, configure it, and distribute it â you'll...
| | Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook... |
|
|
Result Page: Previous 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 Next |