|
|
Current Diagnosis & Treatment in Psychiatry
A convenient, up-to-date, time-saving reference for the diagnosis, psychopharmacologic treatment, and psychotherapeutic management of the full range of psychiatric disorders. Includes a highly useful separate section devoted to psychiatric disorders occurring in infancy, childhood, and adolescence. Extensive Index and detailed Table of... | | Programming the Raspberry Pi, Second Edition: Getting Started with Python
An updated guide to programming your own Raspberry Pi projects
Learn to create inventive programs and fun games on your powerful Raspberry Piâwith no programming experience required. This practical book has been revised to fully cover the new Raspberry Pi 2, including upgrades to the Raspbian operating system. Discover ... | | MySQL and JSON: A Practical Programming Guide
Practical instruction on using JavaScript Object Notation (JSON) with MySQL
This hands-on guide teaches, step by step, how to use JavaScript Object Notation (JSON) with MySQL. Written by a MySQL Community Manager for Oracle, MySQL and JSON: A Practical Programming Guide... |
|
|
|
Hacking Exposed Mobile: Security Secrets & Solutions
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Proven security tactics for today's mobile apps,devices, and networks
"A great overview of the new threats created... | | Database Systems Concepts with Oracle CD
The Fourth edition of Database System Concepts has been extensively revised from the 3rd edition. The new edition provides improved coverage of concepts, extensive coverage of new tools and techniques, and updated coverage of database system internals. This text is intended for a first course in databases at the junior or senior... | | Information Security: The Complete Reference, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Develop and implement an effective end-to-end security program
Today’s complex world of mobile platforms, cloud... |
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |