-
-
Corporate Computer Security (3rd Edition)
... , can security polices be defined and technical solutions be selected. The purpose of this course is to prepare business decision makers who recognize the threats and vulnerabilities present in existing systems and who know how to design secure systems.
-
The c++ Programming Language 4Ed_en.pdf(英文完美版)
... definitive guidance for leveraging its improvements in performance, reliability, and clarity. C++ programmers around the world recognize Bjarne Stoustrup as the go-to expert for the absolutely authoritative and exceptionally useful information they need ...
-
-
Android.for.the.BeagleBone.Black
... BeagleBone Black
About This Book
Design custom apps that interact with the outside world via BeagleBone Black
Modify Android to recognize, configure, and communicate with sensors, LEDs, memory, and more
A step-by-step guide full of practical Android app ...
-
AutoUpgrader_XE7
... without single line of code. It contains built-in Application Update Wizard, built-in multi-language support (it automatically recognize language used on user's PC and displays all messages in native language). The AutoUpgrader can download your files ...
-
Cplusplus Succinctly Syncfusion 2012
... or eliminate a bug If reading this book imparts enough knowledge and a good enough feel for the language that you are able to recognize diagnose and resolve those issues then I will be content that I have succeeded in my goals Welcome to C++ "> ...
-
Refactoring: Ruby Edition
... help you
这本书会帮助你:
• Understand the core principles of refactoring and the reasons for doing it
理解重构的核心原则以及为什么要这么做
• Recognize “bad smells” in your Ruby code
发现你 Ruby 代码中的 "bad smells"
• Rework bad designs into well-designed code, one step at a ...
-
A Practical Introduction to Data Structures & Algorithm Analysis
... measure performance and does so as an integral
part of the design and implementation process. Most computer science curricula
recognize that good programming skills begin with a strong emphasis on fundamental
software engineering principles. Then, once a ...
-
Sudoku.Programming.with.C.1484209966
... the puzzles in your local paper are not so challenging after all!
We like Sudokus because they test our capacity to recognize and interpret patterns. But how are the clues generated? Where do those quasi-symmetrical configurations come from? When the ...
-
Theory of Computation Wiley 2012
... the author presents automata and languages covering the regular and context free languages as well as the machines that recognize these languages">Offering an accessible approach to the topic Theory of Computation focuses on the metatheory of ...
-