Пн, 06 Май 24, 9:21 AM
Приветствую Вас Гость | Регистрация | Вход

К Н И Г И

Меню сайта
Форма входа
Поиск
Категории раздела
Art, Drawing [1]
Cooking [4]
Computers [4]
Electrical Engineering [2]
Encyclopedias [1]
Hobby, DIY [12]
Home Design [1]
Fiction, Non Fiction [0]
For Children [0]
Graphics Programs [6]
Health and Care [1]
Microcontrollers [6]
Microsoft Office [1]
Mobile Devices [2]
Music [0]
Photography [1]
Popular science [3]
Programming [36]
Psychology [0]
Robotics [5]
Security [2]
Self-development [0]
Technics [4]
Travel [1]
Unix and Linux [0]
Web Design [0]
Woodworking [1]
Other [3]
Видеокурсы


Alibaba: Ваш посредник в деле получения огромной прибыли (2016) Видеокурс 


WDI. Веб-дизайн. Интенсив (2015) 


Видео-уроки лепки для детей и взрослых.(mp4) 


Онлайн библиотека на Spring (2015) 


Как зарабатывать в Telegram (2017) Мастер-класс 
Музыка


VA - Work & Study Ambient Music Vol. 2 (2018) 


Tina Turner - Love Songs (2014) 


Easy Listening Guitar All Stars - Chillout Easy Listening Guitar Music - Musica Sensual (2014) 


VA - Erotica Vol 3: Most Erotic Smooth Jazz And Chillout Tunes (2018) 


Mariah Carey - Me. I Am Mariah… The Elusive Chanteuse [Deluxe Edition] (2014) 
Интересное


Аллен Карр - Легкий способ бросить пить.(mp3, 64 kbps)


Практическая биоэнергетика.


Александр Громов. Вычислитель. Сборник


Путешествие оптимистки, или Все бабы дуры.


Аллергия: выбираем свободу.
Статистика

ОБЗОР САЙТА

Главная » Статьи » BOOKS » Programming

В категории материалов: 36
Показано материалов: 21-30
Страницы: « 1 2 3 4 »

Сортировать по: Дате

Assembly Language Programming Made Clear: A Systematic Approach teaches students the fundamentals of assembly language programming through the use of two pseudo-languages that enable them to design their programs. It also prepares them to write their programs by teaching them the structure of the necessary registers.


This tutorial teaches everything you need to get started with Python programming for the fast-growing field of data analysis. Daniel Chen tightly links each new concept with easy-to-apply, relevant examples from modern data analysis.


Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.


Algorithms: Design and Analysis of is a textbook designed for the undergraduate and postgraduate students of computer science engineering, information technology, and computer applications. It helps the students to understand the fundamentals and applications of algorithms. The book has been divided into four sections: Algorithm Basics, Data Structures, Design Techniques and Advanced Topics.


This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis.


This book is a painstakingly crafted, expertly written, code-fueled, no-nonsense deep dive into HTML5 Canvas printed in full color with syntax-highlighted code listings throughout. 

Core HTML5 Canvas is written for experienced software developers with an intermediate-level understanding of JavaScript. 


Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.


This book is focused on the Internet of Things (IoT) services and smart environments that can be of assistance to the elderly and individuals living with dementia or some sensory impairment. The book outlines the requirements of the systems that aim to furnish some digital sensory or cognitive assistance to the individuals and their caregivers. Internet of Things and Smart Environments: Assistive Technologies for Disability, Dementia, and Aging covers the important evolutions of the IoT, the sensors, actuators, wireless communication and pervasive computing systems, and other enabling technologies that power up this megatrend infrastructure. The use of the IoT-based systems in improving the conventional assistive technologies and provisions of ambient assisted living are also covered.


Real examples written in PHP showcasing DDD Architectural Styles, Tactical Design, and Bounded Context Integration. Domain-Driven Design (DDD) has arrived in the PHP community, but for all the talk, there is very little real code. Without being in a training session and with no PHP real examples, learning DDD can be challenging. This book changes all that. It details how to implement tactical DDD patterns and gives full examples of topics such as integrating Bounded Contexts with REST, and DDD messaging strategies. 


Gain the skills to begin developing Perl 6 applications from the ground up in this hands-on compact book, which includes a foreword from Larry Wall, creator of Perl. You’ll learn enough to get started building with Perl 6, using Perl 6’s gradual typing, handy object orientation features, powerful parsing capabilities, and human-usable concurrency. After a short introduction, each chapter develops a small example project, explaining the Perl 6 features used. When the example is done, you’ll explore another aspect, such as optimizing further for readability or testing the code.