• Welcome!
Total books

Computer & Internet

Administration
289
AI and Robotics
165
Algorithms
19
Cloud
373

Communicaion and Telecommunication
111
Databases
716
Enterprise
145
Graphics & Design
234

Hardware
331
Information Technology
305
Mobile Computing
542
Network Security
69

Operating System
298
Programming
1572
Security
136
Software Engineering
172

Web Design & Development
437
Web Development
1343
Sort by
Programming Microsoft® ASP.NET MVC
Programming Microsoft® ASP.NET MVC Sented by Sarah Gerdes

Delve into the features, principles, and pillars of the ASP.NET MVC framework-deftly guided by Web development luminary Dino Esposito. ASP.NET MVC forces developers to think in terms of distinct components-model, view, controller-that make it easier to manage application complexity.

Deep Belief Nets in C++ and CUDA C: Volume 1: Restricted Boltzmann Machines and Supervised Feedforward Networks

Discover the essential building blocks of the most common forms of deep belief networks. At each step this book provides intuitive motivation, a summary of the most important equations relevant to the topic, and concludes with highly commented code for threaded computation on modern CPUs as well as massive parallel processing on computers with CUDA-capable video display cards.

XML for ASP.NET Developers

XML for ASP.NET Developers first gives a solid foundation in the basics of MSXML including XML Syntax, XML Schemas, Xpath, Xlink, Xpointer, and other concepts necessary to leverage the power of XML.

Cyber Security Policy Guidebook

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale―taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions―as well as the pros and cons―of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices.

Cyber Security for You
Cyber Security for You Sented by Steve Bark

At our company, we research cyber hacking attacks all over the world to see if our server protection product will protect against the techniques used in the attack. In the course of this research, one important conclusion kept leaping out: MOST HACKING ATTEMPTS ARE PREVENTABLE FOR LITTLE COST AND SOME KNOWLEDGE.

Cryptography in C and C++
Cryptography in C and C++ Sented by Emma

The chapter on primality tests is thoroughly revised. This is the first book to include practical implementations of the recent major improvements in primality testing

Cisco Secure Internet Security Solutions (Cisco Press Core Series)

At present, no available publication deals with Internet security from a Cisco perspective utilizing the Cisco Secure product family. Cisco Secure Internet Security Solutions covers the basics of Internet security and then concentrates on each member of the Cisco Secure product family, providing a rich explanation with examples of the preferred configurations required for securing Internet connections

Cisco LAN Switching Configuration Handbook

Cisco LAN Switching Configuration Handbook Second Edition A concise reference for implementing the most frequently used features of the Cisco Catalyst family of switches Steve McQuerry, CCIE® No. 6108 David Jansen, CCIE No. 5952 David Hucaby, CCIE No. 4594 Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series of chapters that provide design and configuration guidelines. Each chapter starts with common design overviews and then describes the configuration of management features. Coverage includes Layer 2, Layer 3, multicast, high availability, and traffic management configurations.

Cisco ISP Essentials (Cisco Press Networking Technology Series)

A comprehensive guide to the best common practices for Internet service providers Learn the best common practices for configuring routers on the Internet from experts who helped build the Internet Gain specific advice through comprehensive coverage of all Cisco routers and current versions of Cisco IOS Software Understand the Cisco IOS tools essential to building and maintaining reliable networks Increase your knowledge of network security Learn how to prevent problems and improve performance through detailed configuration examples and diagrams

Cisco Intelligent WAN (IWAN) (Networking Technology)

The complete guide to Cisco® IWAN: features, benefits, planning, and deployment Using Cisco Intelligent WAN (IWAN), businesses can deliver an uncompromised experience, security, and reliability to branch offices over any connection. Cisco IWAN simplifies WAN design, improves network responsiveness, and accelerates deployment of new services. Now, there’s an authoritative single-source guide to Cisco IWAN: all you need to understand it, design it, and deploy it for maximum value.

Chef Essentials
Chef Essentials Sented by Steve Bark

Learn how to use Chef in a concise manner Learn ways to use Chef to integrate with cloud services such as EC2 and Rackspace Cloud See advanced ways to integrate Chef into your environment, develop tests, and even extend Chef's core functionality

CCNA Cloud CLDFND 210-451 Official Cert Guide

Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

AWS System Administration: Best Practices for Sysadmins in the Amazon Cloud

With platforms designed for rapid adaptation and failure recovery such as Amazon Web Services, cloud computing is more like programming than traditional system administration. Tools for automatic scaling and instance replacement allow even small DevOps teams to manage massively scalable application infrastructures—if team members drop their old views of development and operations and start mastering automation.

Sort by