Home | Amazing | Today | Tags | Publishers | Years | Search 
Concurrent and Distributed Computing in Java
Concurrent and Distributed Computing in Java

An in-depth introduction to concurrent and distributed computing with Java

Combining the two key types of Java programming, Concurrent and Distributed Computing in Java offers both professionals and students a comprehensive guide to fundamental concepts necessary for mastering Java programming.

The text is presented in...

Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)
Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class...

Beginning C# 2008 Databases: From Novice to Professional
Beginning C# 2008 Databases: From Novice to Professional
Assuming only basic knowledge of C# 2008, Beginning C# 2008 Databases teaches all the fundamentals of database technology and database programming readers need to quickly become highly proficient database users and application developers.

A comprehensive tutorial on both SQL Server 2005 and ADO.NET 3.0, Beginning C# 2008...

Genomic Perl: From Bioinformatics Basics to Working Code
Genomic Perl: From Bioinformatics Basics to Working Code

"I found this to be an excellent book, and would not hesitate to recommend it to advanced undergraduate and postgraduate students." Saturnino Luz, Computing Reviews

In this introduction to computational molecular biology, Rex Dwyer explains many basic computational problems and gives concise, working programs to
...

Handbook of Digital and Multimedia Forensic Evidence
Handbook of Digital and Multimedia Forensic Evidence
Handbook of Digital and Multimedia Forensic Evidence presents an overview of computer forensics perfect for beginners. This volume will serve as a foundation and guide for: (a) students considering a career in this field; (b) the law enforcement investigator assigned to work cybercrimes; (c) establishing training programs for forensic...
Oracle Database 11g SQL
Oracle Database 11g SQL
Today’s database management systems are accessed using a standard language known as Structured Query Language, or SQL. Among other things, SQL allows you to retrieve, add, update, and delete information in a database. In this book, you’ll learn how to master SQL, and you’ll find a wealth of practical examples. You can also get all...
Architecture of Concurrent Programs (Prentice-Hall series in automatic computation)
Architecture of Concurrent Programs (Prentice-Hall series in automatic computation)
book describes a method for writing concurrent computer programs of high quality. It is written for professional programmers and students who are faced with the complicated task of building reliable computer operating systems or real-time control programs.

The motivations for mastering concurrent programming are both economic and
...
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for...
Developing International Software for Windows 95 and Windows NT (Microsoft Programming Series)
Developing International Software for Windows 95 and Windows NT (Microsoft Programming Series)

In the late 1980s, Microsoft's International Product Group (IPG), the team responsible for creating most of the localized versions of Microsoft products, distributed a booklet internally that contained guidelines for writing code that accommodated the needs of international developers and users. The International Handbook for Software...

Implementation Patterns (Addison-Wesley Signature)
Implementation Patterns (Addison-Wesley Signature)
Software Expert Kent Beck Presents a Catalog of Patterns Infinitely Useful for Everyday Programming

 

Great code doesn’t just function: it clearly and consistently communicates your intentions, allowing other programmers to understand your code, rely on it, and modify...

Microsoft Windows 2000 Professional Resource Kit
Microsoft Windows 2000 Professional Resource Kit

Welcome to the Microsoft® Windows® 2000 Professional Resource Kit.

The Windows 2000 Professional Resource Kit consists of this guide and a compact disc (CD) containing tools, additional reference materials, and an online version of the Microsoft® Windows® 2000 Server Resource Kit Deployment Planning...

A Clinical Guide to Pediatric Weight Management and Obesity
A Clinical Guide to Pediatric Weight Management and Obesity
Obesity represents the most common chronic illness of children and adolescents. Childhood obesity affects every age group from infancy to young adulthood and one quarter to one third of all pediatric patients. With the rapid onset of the obesity epidemic, pediatric health care professionals are struggling to meet the clinical and educational...
Result Page: 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 793 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy