Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 41-50 results of 56321

Containers are here and resistance is futile! Now that we're getting our heads around Docker, we need an orchestration platform to help us manage our containerized apps. Kubernetes has emerged as the hottest and most important container orchestration platform in the world. This book gets you up to speed fast, and it's constantly kept up-to-date!

This book provides a first course on lattices – mathematical objects pertaining to the realm of discrete geometry, which are of interest to mathematicians for their structure and, at the same time, are used by electrical and computer engineers working on coding theory and cryptography. The book presents both fundamental concepts and a wealth of applications, including coding and transmission over Gaussian channels, techniques for obtaining lattices... more...

Key Features Learn how to change and extend WordPress to perform virtually any task Explore the plugin API through approachable examples and detailed explanations Mold WordPress to your project's needs or transform it to benefit the entire community Book Description WordPress is a popular, powerful, and open Content Management System. Learning how to extend its capabilities allows you to unleash its full potential,... more...

The Extensible Markup Language is changing the way that information is being stored and exchanged. It is also changing the very way that we think about data. XML Unleashed allows you to unlock this new power and get you well on your way towards developing XML applications and systems that enable your most important business processes, or your simplest visions for data representation and exchange. Written for those already familiar with... more...

Since 2002, FoLLI awards an annual prize for an outstanding dissertation in the fields of Logic, Language, and Information. This book is based on the Ph.D. thesis of Gabriele Puppis, who was the winner of the E.W. Beth dissertation award for 2007. Puppis' thesis focuses on Logic and Computation and, more specifically, on automata-based decidability techniques for time granularity and on a new method for deciding Monadic Second Order theories of trees.... more...


A comprehensive coverage of emerging and current technology dealing with heterogeneous sources of information, including data, design hints, reinforcement signals from external datasets, and related topics Covers all necessary prerequisites, and if necessary,additional explanations of more advanced topics, to make abstract concepts more tangible Includes illustrative material andwell-known experimentsto offer hands-on... more...

PRACTICAL, EXAMPLE-RICH COVERAGE OF: Classes, Objects, Encapsulation, Inheritance, Polymorphism Integrated OOP Case Studies: Time, GradeBook, Employee Industrial-Strength, 95-Page OOD/UML® 2 ATM Case Study Standard Template Library (STL): Containers, Iterators and Algorithms I/O, Types, Control Statements, Functions Arrays, Vectors, Pointers, References String Class, C-Style Strings Operator Overloading,... more...

Phil Factor is a legend in his own runtime. Scurrilous, absurd, confessional and scathing by turns, Confessions of an IT Manager targets the idiocy, incompetence and overreach of the IT management industry from vantage point all the way up and down the greasy pole. Phil Factor (real name witheld to protest the guilty) has over 20 years experience in the IT industry, specializing in database-intensive applications. For withering insight into the human... more...

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guide This thoroughly updated, money-saving self-study set gathers essential exam-focused resources... more...

This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in... more...