• Welcome!
Total books

Computer & Internet

AI and Robotics
165
Algorithms
19
Communicaion and Telecommunication
107
Databases
716

Hardware
331
Information Technology
305
Mobile Computing
542
Network Security
69

Operating System
298
Programming
1568
Security
136
Software Engineering
172

Web Design & Development
437
Web Development
1343
Graphics & Design
232
Administration
289

Enterprise
145
Cloud
373
Sort by
Component- Oriented Development and Assembly: Paradigm, Principles, and Practice using Java

Although industry has been leveraging the advancements of component-oriented development and assembly (CODA) technology for some time, there has long been a need for a book that provides a complete overview of the multiple technologies that support CODA. Filling this need, Component-Oriented Development and Assembly supplies comprehensive coverage of the principles, practice, and paradigm of component-oriented development and assembly.

Big Java: Early Objects, 6th Edition

Cay Horstmann's sixth edition of Big Java, Early Objects provides an approachable introduction to fundamental programming techniques and design skills, helping students master basic concepts and become competent coders.

Concurrent and Real-Time Programming in Ada

Ada is the only ISO-standard, object-oriented, concurrent, real-time programming language. It is intended for use in large, long-lived applications where reliability and efficiency are essential, particularly real-time and embedded systems.

Wireshark 2 Quick Start Guide: Secure your network through protocol analysis

Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis over your network in an event of network failure or a security breach

Wireshark Revealed: Essential Skills for IT Professionals

Gain valuable insights into the network and application protocols, and the key fields in each protocol Use Wireshark's powerful statistical tools to analyze your network and leverage its expert system to pinpoint network problems Master Wireshark and train it as your network sniffer

Troubleshooting-and-Maintaining-Your-PC-All-in-One-For-Dummies-3rd-Edition

Need a PC problem fixed in a pinch? Presto! Troubleshooting & Maintaining Your PC All-in-One For Dummies offers 5 books in 1 and takes the pain out of wading through those incomprehensible manuals, or waiting for a high-priced geek to show up days or weeks after you need them. Arming you with everything you need to get that pesky PC working for you ASAP, this handy guide walks you through all the steps to restoring whatever's making your PC go rogue —so you can get back to making it work for you.

Visual Basic.NET at Work: Building 10 Enterprise Projects

Gain the tools to create 10 reusable enterprise projects utilizing the new features of VB.NET Going beyond the standard reference books, Tony Martin takes readers step-by-step through the process of creating ten reusable enterprise applications with the next version of Microsoft's leading programming language-Visual Basic.NET. Readers will start by building a standard application template, which will form the basis of all the projects. Martin explains how to combine VB.NET with other key technologies, such as Web Services, ASP.NET, XML, WebForms, and the Microsoft Mobile Framework, to solve the important issues corporate Visual Basic programmers face today.

Practical Windows Forensics
Practical Windows Forensics Sented by Sarah Gerdes

Build your own lab environment to analyze forensic data and practice techniques. This book offers meticulous coverage with an example-driven approach and helps you build the key skills of performing forensics on Windows-based systems using digital artifacts. It uses specific open source and Linux-based tools so you can become proficient at analyzing forensic data and upgrade your existing knowledge.

Securing Office 365: Masterminding MDM and Compliance in the Cloud

Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Sams Teach Yourself Java in 21 Days (Covers Java 11/12) (8th Edition)

In just 21 days, you can acquire the knowledge and skills necessary to develop applications on your computer, web servers, and mobile devices. With this complete tutorial you’ll quickly master the basics and then move on to more advanced features and concepts. Completely updated for Java 11 and 12, this book teaches you about the Java language and how to use it to create applications for any computing environment. By the time you have finished the book, you’ll have well-rounded knowledge of Java and the Java class libraries.

Real-World Machine Learning
Real-World Machine Learning Sented by Sarah Gerdes

Summary Real-World Machine Learning is a practical guide designed to teach working developers the art of ML project execution. Without overdosing you on academic theory and complex mathematics, it introduces the day-to-day practice of machine learning, preparing you to successfully build and deploy powerful ML systems. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

PyTorch Recipes: A Problem-Solution Approach

Get up to speed with the deep learning concepts of Pytorch using a problem-solution approach. Starting with an introduction to PyTorch, you'll get familiarized with tensors, a type of data structure used to calculate arithmetic operations and also learn how they operate. You will then take a look at probability distributions using PyTorch and get acquainted with its concepts. Further you will dive into transformations and graph computations with PyTorch. Along the way you will take a look at common issues faced with neural network implementation and tensor differentiation, and get the best solutions for them.

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.

Pragmatic Unit Testing in Java 8 with JUnit

The Pragmatic Programmers classic is back! Freshly updated for modern software development, Pragmatic Unit Testing in Java 8 With JUnit teaches you how to write and run easily maintained unit tests in JUnit with confidence. You'll learn mnemonics to help you know what tests to write, how to remember all the boundary conditions, and what the qualities of a good test are. You'll see how unit tests can pay off by allowing you to keep your system code clean, and you'll learn how to handle the stuff that seems too tough to test.

Sort by