intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Computer Programming

Xem 1-20 trên 2537 kết quả Computer Programming
  • Giáo trình "Tiếng Anh chuyên ngành Công nghệ thông tin (English for IT & computer users)" bao gồm nhiều chủ đề về công nghệ thông tin, sử dụng các bài đọc và hình minh họa được trích từ sách, báo, các tạp chí chuyên ngành máy tính, Intemet, trang Web, sách hướng dẫn và các mẫu tin quảng cáo nhằm giúp học viên thu nhận và phát triển những kỹ năng cần thiết để học các chuyên ngành Công nghệ Thông tin sau này.

    pdf126p nguyetthuongvophong1010 04-03-2024 1 0   Download

  • Ebook "The mathematics and topology of fullerenes (The mathematics and topology of fullerenes, Volume 04)" presents a comprehensive overview of scientific and technical innovations in theoretical and experimental studies.

    pdf294p manmanthanhla0201 26-02-2024 2 2   Download

  • Ebook "Applied bioinformatics: An introduction" introduces readers to the basic principles of bioinformatics and the practical application and utilization of computational tools, without assuming any prior background in programming or informatics. It provides a coherent overview of the complex field and focuses on the implementation of online tools, genome databases and software that can benefit scientists and students in the life sciences.

    pdf297p tachieuhoa 28-01-2024 3 2   Download

  • Ebook "Theory and mathematical methods for bioinformatics" on biomathematics published within the past ten years have consisted of collections of standard bioinformatics problems and informational methods, and focus mainly on the logistics of implementing and making use of various websites, databases, software packages and serving platforms. While these types of books do introduce some mathematical and computational methods alongside the software packages, they are lacking in a systematic and professional treatment of the mathematics behind these methods.

    pdf450p tachieuhoa 28-01-2024 4 2   Download

  • Part 1 book "Computer graphics programming in OpenGL with Java" includes content: Getting started, the OpenGL graphics pipeline, mathematical foundations, managing 3D graphics data, texture mapping, 3D models, lighting, shadows, sky and backgrounds.

    pdf263p muasambanhan05 16-01-2024 3 3   Download

  • Part 2 book "Computer graphics programming in OpenGL with Java" includes content: Parametric surfaces, tessellation, geometry shaders, other techniques, simulating water, ray tracing and compute shaders, stereoscopy for 3D glasses and VR headsets.

    pdf274p muasambanhan05 16-01-2024 3 3   Download

  • This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). My hope is that not only will consultants (such as myself) find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics.

    pdf221p longtimenosee02 03-01-2024 3 2   Download

  • In ebook Operating systems: A concept-based approach - Part 1, the following content will be discussed: Chapter 1: introduction; chapter 2: the os, the computer, and user programs; chapter 3: overview of operating systems; chapter 4: structure of operating systems; chapter 5: processes and threads; chapter 6: process synchronization; chapter 7: scheduling; chapter 8: deadlocks; chapter 9: message passing; chapter 10: synchronization and scheduling in multiprocessor operating systems.

    pdf381p longtimenosee02 03-01-2024 2 1   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.

    pdf316p longtimenosee02 03-01-2024 1 1   Download

  • Ebook The C programming language (Second edition) present the complete guide to ANSI standard C language programming. Written by the developers of C, this new version helps readers keep up with the finalized ANSI standard for C while showing how to take advantage of C's rich set of operators, economy of expression, improved control flow, and data structures. The 2/E has been completely rewritten with additional examples and problem sets to clarify the implementation of difficult language constructs.

    pdf288p longtimenosee02 03-01-2024 1 1   Download

  • Ebook Forensics ToolKit users guide Part 2 includes contents: Chapter 9 data carving, chapter 10 using filters, chapter 11 searching the registry, chapter 12 decrypting EFS, chapter 13 working with reports, chapter 14 customizing FTK, chapter 15 managing licenses, chapter 16 troubleshooting, chapter 17 FTK recognized file types, chapter 18 regular expression searching, chapter 19 recovering deleted material, chapter 20 program files, chapter 21 securing windows registry evidence, chapter 22 corporate information.

    pdf162p longtimenosee02 03-01-2024 2 2   Download

  • Ebook Photoshop elements 3 for dummies: Part 2 includes contents: Chapter 11 the midas retouch; chapter 12 darkroom déjà vu; chapter 13 the rainbow correction; chapter 14 startling style; chapter 15 if a picture paints a thousand words . . . then shut up and paint; chapter 16 painting with the digital stencil; chapter 17 type righter; chapter 18 can photoshop elements do that?; chapter 19 ten shortcuts to committo long-term memory; chapter 20 ten reasons why you might want to upgrade to photoshop someday.

    pdf200p longtimenosee02 03-01-2024 4 3   Download

  • In this part, the following content will be discussed: Appendix A: Glossary, Appendix B: Port numbers used by malicious trojan horse programs, Appendix C: Attack signatures, Appendix D: UNIX/Linux commands, Appendix E: Cisco PIX firewall commands, Appendix F: Discovering unauthorized access to your computer, Appendix G: U.S. Department of justice search and seizure guidelines.

    pdf199p longtimenosee02 03-01-2024 3 2   Download

  • In ebook Digital video for dummies: part 2, the following content will be discussed: Chapter 14: putting your movies on the internet, chapter 15: exporting digital video to tape, chapter 16: recording CDS and DVDS, chapter 17: ten videography tips and tricks, chapter 18: ten tools for digital video production, chapter 19: comparing ten video-editing programs, appendix a: about the cd, appendix b: glossary, appendix c: installing apple imovie, appendix d: using pinnacle studio, appendix e: using windows movie maker.

    pdf154p longtimenosee02 03-01-2024 2 2   Download

  • File formats handbook is divided into several parts, includes contents: Part 1 describes various dBASE compatible formats. The applications covered are dBASE, Clipper and FoxPro. Part 2 deals with formats used by a number of spreadsheet programs. The formats used by LOTUS 1-2-3 and EXCEL are described, together with the specifications of data exchange formats such as DIFF, SYLK and so on. Part 3, in the area of word processing, the number of formats is huge. This part describes the formats for MS-WORD, WordPerfect and AMI PRO.

    pdf624p longtimenosee02 03-01-2024 4 2   Download

  • This book is mainly written for computer professionals (systems administrators, computer scientists, computer security experts) or people interested in the virus field who wish to acquire a clear and independent knowledge about viruses as well as incidently of the risks and possibilities they represent. The only audience the book is not for, is computer criminals, unfairly referred as “computer geniuses” in the media who unscrupulously encourage and glamorize them somehow.

    pdf411p haojiubujain010 14-12-2023 0 0   Download

  • Ebook Computer viruses hacking and malware attacks for dummies: Part 2 includes contents: Chapter 8: updating antivirus software and signatures; chapter 9: installing security patches; chapter 10: using firewalls and spyware blockers; chapter 11: protecting PDAs from viruses; chapter 12: incorporating safe computing practices; chapter 13: viruses and the losers whowrite them; chapter 14: trojan horses, worms, spam, and hoaxes; chapter 15: how viruses function and propagate; chapter 16: almost ten myths about computer viruses; chapter 17: ten antivirus programs.

    pdf160p haojiubujain010 14-12-2023 1 0   Download

  • Giáo trình Tiếng Anh chuyên ngành (Nghề: Lập trình máy tính - Cao đẳng) được biên soạn với mục tiêu nhằm giúp sinh viên đọc được các tài liệu về công nghệ thông tin; đọc được các tài liệu kỹ thuật. Mời các bạn cùng tham khảo!

    doc23p boghoado01 18-12-2023 3 3   Download

  • Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.

    pdf331p haojiubujain09 30-11-2023 4 3   Download

  • This book is organized in weeks, with each set of seven days set off into a part unto itself. However, even though the book is organized in weeks, the topics are not necessarily organized that way. While you are reading this book, you will probably notice a couple conventions that have been used to make it easier for you to learn the topic being discussed.

    pdf792p haojiubujain09 30-11-2023 4 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2