Browse Results

Showing 38,901 through 38,925 of 54,399 results

FileMaker Pro 12: The Missing Manual

by Susan Prosser Stuart Gripman

<p>You don&#8217;t have to be a techie to use FileMaker Pro 12, but you do need to know what you&#8217;re doing. With this crystal-clear guide, you&#8217;ll learn how to create a powerful database that lets you do almost anything with your data. Whether you&#8217;re running a business, printing a catalog, or planning a wedding, you&#8217;ll learn how to customize your database and put it to work.</p>

FileMaker Pro 12: The Missing Manual

by Susan Prosser Stuart Gripman

You don’t have to be a techie to use FileMaker Pro 12, but you do need to know what you’re doing. With this crystal-clear guide, you’ll learn how to create a powerful database that lets you do almost anything with your data. Whether you’re running a business, printing a catalog, or planning a wedding, you’ll learn how to customize your database and put it to work.The important stuff you need to know:Get started. Tour FileMaker Pro’s features and create your first database in minutes.Catalog your data. View, sort, and shape information in dozens of ways.Create professional documents. Publish reports, invoices, and other documents with ease.Harness processing power. Use calculations and scripts to crunch numbers, search text, and automate tasks.Add visual power and clarity. Create colorful charts to illustrate and summarize your data.Think like a developer. Dive into the high-level features of FileMaker Pro Advanced.

FileMaker Pro 13: The Missing Manual

by Susan Prosser Stuart Gripman

You don’t need a technical background to build powerful databases with FileMaker Pro 13. This crystal-clear guide covers all new FileMaker Pro 13 features, such as its improved layout tools and enhanced mobile support. Whether you’re running a business, printing a catalog, or planning a wedding, you’ll learn how to customize your database to run on a PC, Mac, Web browser, or iOS device.The important stuff you need to know:Get started. Tour FileMaker Pro’s features and create your first database in minutes.Access data anywhere. Use FileMaker Go on your iPad or iPhone—or share data on the Web.Dive into relational data. Solve problems quickly by connecting and combining data tables.Create professional documents. Publish reports, invoices, catalogs, and other documents with ease.Harness processing power. Use calculations and scripts to crunch numbers, search text, and automate tasks.Add visual power and clarity. Create colorful charts to illustrate and summarize your data.Share your database on a secure server. Add the high-level features of FileMaker Pro Advanced and FileMaker Pro Server.

FileMaker Pro 14: The Missing Manual

by Susan Prosser Stuart Gripman

You don’t need a technical background to build powerful databases with FileMaker Pro 14. This crystal-clear, objective guide shows you how to create a database that lets you do almost anything with your data so you can quickly achieve your goals. Whether you’re creating catalogs, managing inventory and billing, or planning a wedding, you’ll learn how to customize your database to run on a PC, Mac, web browser, or iOS device.The important stuff you need to know:Dive into relational data. Solve problems quickly by connecting and combining data from different tables.Create professional documents. Publish reports, charts, invoices, catalogs, and other documents with ease.Access data anywhere. Use FileMaker Go on your iPad or iPhone—or share data on the Web.Harness processing power. Use new calculation and scripting tools to crunch numbers, search text, and automate tasks.Run your database on a secure server. Learn the high-level features of FileMaker Pro Advanced.Keep your data safe. Set privileges and allow data sharing with FileMaker’s streamlined security features.

Knowledge Recommendation Systems with Machine Intelligence Algorithms: People and Innovations (Studies in Computational Intelligence #1101)

by Jarosław Protasiewicz

Knowledge recommendation is an timely subject that is encountered frequently in research and information services. A compelling and urgent need exists for such systems: the modern economy is in dire need of highly-skilled professionals, researchers, and innovators, who create opportunities to gain competitive advantage and assist in the management of financial resources and available goods, as well as conducting fundamental and applied research more effectively.This book takes readers on a journey into the world of knowledge recommendation, and of systems of knowledge recommendation that use machine intelligence algorithms. It illustrates knowledge recommendation using two examples. The first is the recommendation of reviewers and experts who can evaluate manuscripts of academic articles, or of research and development project proposals. The second is innovation support, which involves bringing science and business together by recommending information that pertains to innovations, projects, prospective partners, experts, and conferences meaningfully.The book also describes the selection of the algorithms that transform data into information and then into knowledge, which is then used in the information systems. More specifically, recommendation and information extraction algorithms are used to acquire data, classify publications, identify (disambiguate) their authors, extract keywords, evaluate whether enterprises are innovative, and recommend knowledge.This book comprises original work and is unique in many ways. The systems and algorithms it presents are informed by contemporary solutions described in the literature - including many compelling, novel, and original aspects. The new and promising directions the book presents, as well as the techniques of machine learning applied to knowledge recommendation, are all original.

How to Be a Coder: Learn to Think like a Coder with Fun Activities, then Code in Scratch 3.0 Online (Careers for Kids)

by Kiki Prottsman

Learn to think like a coder without a computer! Each of the fun craft activities included in this book will teach you about a key concept of computer programming and can be done completely offline. Then you can put your skills into practice by trying out the simple programs provided in the online, child-friendly computer language Scratch.This crafty coding book breaks down the principles of coding into bite-sized chunks that will get you thinking like a computer scientist in no time. Learn about loops by making a friendship bracelet, find out about programming by planning a scavenger hunt, and discover how functions work with paper fortune tellers. Children can then use their new knowledge to code for real by following the clear instructions to build programs in Scratch 3.0.Perfect for kids aged 7-9, the various STEAM activities will help teach children the crucial skills of logical thinking that will give them a head-start for when they begin programming on a computer. Famous scientist pages teach children about coding pioneers, such as Alan Turing and Katherine Johnson, and topic pages, such as the Internet, give kids a wider understanding of the subject.Written by computer science expert Kiki Prottsman, How to be a Coder is so much fun kids won't realize they're learning!

Let′s All Teach Computer Science!: A Guide to Integrating Computer Science Into the K-12 Classroom

by Kiki Prottsman

You belong in this world of computer science education—and because of you, adults of the future will understand how to responsibly participate in high-tech environments with confidence. Districts, cities, and states are moving toward computer science requirements for all K-12 classrooms, even in courses that were not previously associated with technology. These new requirements leave many teachers feeling anxious and unprepared when it comes to integrating computer science into existing curriculum. This book is here to support educators in that shift by inviting them to explore computer science and coding in an approachable and unintimidating way. Let′s All Teach Computer Science: K-12 is a source of inspiration and empowerment for educators who are moving into this technological wonderland. Kiki Prottsman has more than 15 years of experience in computer science education, and her insight informs thoughtful discussions on promoting creativity, problem-solving, and collaboration in students. The book positions computer science in a way that supports other essential skills–such as reading, writing, and mathematics– by providing customizable frameworks that help to seamlessly integrate computer science into core subjects. This book: Provides powerful insights for creating innovative and inclusive learning environments Offers practical examples of integrating computer science into traditional subjects like math, history, art, and more Highlights the importance of addressing implicit biases and promoting computer science as an inclusive field for all students Includes insights on classroom technology and educational technology, as well as AI and its role in education Encourages educators to work together to nurture digital innovators while recognizing potential challenges and frustrations Let′s All Teach Computer Science is an essential guide that equips K-12 teachers with the knowledge and tools necessary to begin teaching computer science immediately–and does so in an enjoyable way, thanks to Prottsman’s friendly and playful style.

Let′s All Teach Computer Science!: A Guide to Integrating Computer Science Into the K-12 Classroom

by Kiki Prottsman

You belong in this world of computer science education—and because of you, adults of the future will understand how to responsibly participate in high-tech environments with confidence. Districts, cities, and states are moving toward computer science requirements for all K-12 classrooms, even in courses that were not previously associated with technology. These new requirements leave many teachers feeling anxious and unprepared when it comes to integrating computer science into existing curriculum. This book is here to support educators in that shift by inviting them to explore computer science and coding in an approachable and unintimidating way. Let′s All Teach Computer Science: K-12 is a source of inspiration and empowerment for educators who are moving into this technological wonderland. Kiki Prottsman has more than 15 years of experience in computer science education, and her insight informs thoughtful discussions on promoting creativity, problem-solving, and collaboration in students. The book positions computer science in a way that supports other essential skills–such as reading, writing, and mathematics– by providing customizable frameworks that help to seamlessly integrate computer science into core subjects. This book: Provides powerful insights for creating innovative and inclusive learning environments Offers practical examples of integrating computer science into traditional subjects like math, history, art, and more Highlights the importance of addressing implicit biases and promoting computer science as an inclusive field for all students Includes insights on classroom technology and educational technology, as well as AI and its role in education Encourages educators to work together to nurture digital innovators while recognizing potential challenges and frustrations Let′s All Teach Computer Science is an essential guide that equips K-12 teachers with the knowledge and tools necessary to begin teaching computer science immediately–and does so in an enjoyable way, thanks to Prottsman’s friendly and playful style.

Trusted Computing Platforms

by Graeme Proudler Liqun Chen Chris Dalton

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers (Lecture Notes in Computer Science #8622)

by Emmanuel Prouff

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.

iPhone in Easy Steps: Covers iPhone 4

by Dr Drew Provan

Assuming no prior knowledge and in the usual easy-to-follow In Easy Steps style, this title will start by explaining what exactly is the iPhone?Then, the author covers 136 topics which include cellular, wireless, battery and storage capabilities; Touch screen display; Virtual keyboard; audio and video playback; camera: stills and video; Buttons and controls; SIM card slot; Ports; Headphone socket; Installed programs; key new features with iPhone software version 4.0; customizing the Wallpaper; basic care of the iPhone; synchronizing data; using MobileMe; battery care; installing system software updates; initial setup and registration; Networks: Edge, 3G and WiFi; Airplane mode; all the clever ways of making phone calls including conference calls; music video; communicating using other programs including skype... everything the reader needs to know to make the most of the iPhone.All this for less than $15! A worthwhile investment for any iPhone 4 newbie!

Phase-Field Methods in Materials Science and Engineering

by Nikolas Provatas Ken Elder

This comprehensive and self-contained, one-stop source discusses phase-field methodology in a fundamental way, explaining advanced numerical techniques for solving phase-field and related continuum-field models.<P><P> It also presents numerical techniques used to simulate various phenomena in a detailed, step-by-step way, such that readers can carry out their own code developments. Features many examples of how the methods explained can be used in materials science and engineering applications.

Precursors of Isogeometric Analysis: Finite Elements, Boundary Elements, and Collocation Methods (Solid Mechanics and Its Applications #256)

by Christopher G. Provatidis

This self-contained book addresses the three most popular computational methods in CAE (finite elements, boundary elements, collocation methods) in a unified way, bridging the gap between CAD and CAE. <P><P>It includes applications to a broad spectrum of engineering (benchmark) application problems, such as elasto-statics/dynamics and potential problems (thermal, acoustics, electrostatics). It also provides a large number of test cases, with full documentation of original sources, making it a valuable resource for any student or researcher in FEA-related areas. <P><P>The book, which assumes readers have a basic knowledge of FEA, can be used as additional reading for engineering courses as well as for other interdepartmental MSc courses.

Computers, Curriculum, and Cultural Change: An Introduction for Teachers

by Eugene F. Provenzo, Jr. Arlene Brett Gary N. McCloskey

Computers, Curriculum, and Cultural Change: An Introduction for Teachers, Second Edition is a comprehensive introduction to using computers in educational settings. What distinguishes this text from others on the topic is its focus on: *the issue of how computers are redefining our culture and society and the work of schools; *the idea of using the computer as a tool for increasing efficiency and productivity in curriculum; and *the concept of the computer as a tool not only for efficiency, but actually as a means of enhancing intelligence. This text provides students with an introduction to basic computer skills and experience, enhanced by helpful pedagogical aids, including case studies and highlighted features, such as Portfolio Development, Reflective Practice, Computing Timelines, Filmographies, bibliographical sources, and a text-linked glossary of key computer terms. New in the Second Edition: In addition to being thoroughly updated, a new section has been added to Chapter 1, "Creating an Electronic Portfolio," with activities linked to the standards for educational computing established by the International Society for Technology in Education (ISTE). Electronic portfolio activities at the end of each chapter give students the hands-on practical skills they need and, at the same time, cover the necessary theoretical and conceptual material for an introductory educational computing course.

Analiza danych w biznesie. Sztuka podejmowania skutecznych decyzji

by Foster Provost Tom Fawcett

Wszystko co powiniene? wiedzie? o eksploracji danych i my?leniu w kategoriach analityki danych. Wyci?gaj trafne wnioski! „Lektura obowi?zkowa dla ka?dego, kto powa?nie my?li o wykorzystaniu okazji, jakie nios? ze sob? wielkie zbiory danych”.— Craig Vaughan, globalny wiceprezes SAPPosiadanie zbiorów danych to po?owa sukcesu. Druga po?owa to umiej?tno?? ich skutecznej analizy i wyci?gania wniosków. Dopiero na tej podstawie b?dziesz w stanie w?a?ciwie oceni? kondycj? Twojej firmy oraz podj?? s?uszne decyzje. Wiedza zawarta w tej ksi??ce mo?e zadecydowa? o sukcesie biznesowym lub pora?ce. Nie ryzykuj i si?gnij po to doskona?e ?ród?o wiedzy, po?wi?cone nauce o danych.To unikalny podr?cznik, który pomo?e Ci sprawnie opanowa? nawet najtrudniejsze zagadnienia zwi?zane z analiz? danych. Dowiedz si?, jak zbudowany jest proces eksploracji danych, z jakich narz?dzi mo?esz skorzysta? oraz jak stworzy? model predykcyjny i dopasowa? go do danych. W kolejnych rozdzia?ach przeczytasz o tym, czym grozi nadmierne dopasowanie modelu i jak go unika? oraz jak wyci?ga? wnioski metod? najbli?szych s?siadów. Na koniec zaznajomisz si? z mo?liwo?ciami wizualizacji skuteczno?ci modelu oraz odkryjesz zwi?zek pomi?dzy nauk? o danych a strategi? biznesow?. To obowi?zkowa lektura dla wszystkich osób chc?cych podejmowa? ?wiadome decyzje na podstawie posiadanych danych!Dzi?ki tej ksi??ce: poznasz model predykcyjny dowiesz si?, jak dopasowa? model do danych zwizualizujesz skuteczno?? zbudowanego modelu zwi?kszysz swoje szanse na osi?gni?cie sukcesu biznesowego​Przeanalizuj posiadane dane i podejmij trafne decyzje! Ta ksi??ka wykracza poza sfer? podstaw analityki danych. To niezb?dny przewodnik dla tych z nas (nas wszystkich?), których firmy zosta?y zbudowane w oparciu o wszechobecno?? okazji biznesowych, wi???cych si? z danymi, i nowe mo?liwo?ci podejmowania decyzji w oparciu o dane.— Tom Phillips, prezes Distillery i by?y szef Google Search i Google Analytics

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram

by David L. Prowse

CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram is an all-inclusive study guide designed to help you pass the updated versions of the CompTIA A+ exams. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice test software provides real-time assessment and feedback with four complete exams. <p><p> Covers the critical information needed to score higher on your CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) exams! <p>* Install, configure, and troubleshoot PC hardware including CPUs, RAM, video cards, network cards, storage drives, and peripherals <p>* Work effectively with mobile devices: laptops, tablets, and smartphones <p><p>* Configure Windows settings, components, and administrative tools <p>* Manage and troubleshoot Linux, macOS, Android, and iOS <p>* Administer and support basic IT infrastructure including IP networking, IoT devices, virtualization, cloud-based systems, and backup systems <p>* Understand security features such as firewalls, multifactor authentication, permissions, and access control * Defend against malware, network threats, and social engineering <p>* Learn the basics of IT documentation, change management, and incident response <p><p> Prepare for your exam with Pearson Test Prep <p><p>* Realistic practice questions and answers <p>* Comprehensive reporting and feedback <p>* Customized testing in study, practice exam, or flash card modes <p>* Complete coverage of A+ Core 1 (220-1101) and Core 2 (220-1102) exam objectives

EXAM CRAM CompTIA A+ 220-901 and 220-902 Practice Questions

by David L. Prowse

CompTIA A+ 220-901 and 220-902 Practice Questions Exam Cram CompTIA A+ 220-901 and 220-902 Practice Questions Exam Cram complements any A+ study plan with 640 practice test questions in the book and on the companion site--all supported by complete explanations of every answer. This package's highly realistic questions cover every area of knowledge for both new A+ exams: 220-901 and 220-902. Covers the critical information you'll need to know to score higher on your A+ 220-901 and 220-902 exams! #65533; Features 640 questions, organized to reflect the newest objectives for the A+ exams, so you can easily assess your knowledge of every topic. #65533; Each question includes a detailed answer explanation. #65533; Provides complete coverage of all objectives for the 220-901 and 220-902 A+ exams. COMPANION WEBSITE #65533; Test engine features more than 600 questions from this book in multiple test modes, among other features #65533; Includes 10 real-world scenarios with supporting simulations and videos

From Protest to President: A Social Justice Journey through the Emergence of Adult Education and the Birth of Distance Learning

by George A Pruitt

From Protest to President describes an inspirational odyssey of a young, Black activist coming of age in Mississippi and Chicago in the tumultuous 1960s and '70s, culminating in a notable thirty-five-year presidency at Thomas Edison State University. From barbershop encounters with Malcolm X to death threats at Illinois State University and gunfire at Towson State, Pruitt provides a powerful narrative poised at the intersection of social justice, higher education and politics. He recounts leadership experiences at HBCUs and public universities across the country, as he advocated for autonomy at Morgan State and fought to preserve Tennessee State University. His steadfast activism, integrity and courage led to groundbreaking work in providing access to higher education for working adults and the military. From his days as a student protester in high school and college to his appearances on Capitol Hill, Pruitt has earned the reputation as a candid and influential leader in higher education.

Practicing Trustworthy Machine Learning

by Yada Pruksachatkun Matthew Mcateer Subho Majumdar

With the increasing use of AI in high-stakes domains such as medicine, law, and defense, organizations spend a lot of time and money to make ML models trustworthy. Many books on the subject offer deep dives into theories and concepts. This guide provides a practical starting point to help development teams produce models that are secure, more robust, less biased, and more explainable.Authors Yada Pruksachatkun, Matthew McAteer, and Subhabrata Majumdar translate best practices in the academic literature for curating datasets and building models into a blueprint for building industry-grade trusted ML systems. With this book, engineers and data scientists will gain a much-needed foundation for releasing trustworthy ML applications into a noisy, messy, and often hostile world.You'll learn:Methods to explain ML models and their outputs to stakeholdersHow to recognize and fix fairness concerns and privacy leaks in an ML pipelineHow to develop ML systems that are robust and secure against malicious attacksImportant systemic considerations, like how to manage trust debt and which ML obstacles require human intervention

Cyber Weaponry: Issues And Implications Of Digital Arms (Advanced Sciences and Technologies for Security Applications)

by Henry Prunckun

There is little doubt that cyber-space has become the battle space for confrontations. However, to conduct cyber operations, a new armory of weapons needs to be employed. No matter how many, or how sophisticated an aggressor’s kinetic weapons are, they are useless in cyber-space. This book looks at the milieu of the cyber weapons industry, as well as the belligerents who use cyber weapons. It discusses what distinguishes these hardware devices and software programs from computer science in general. It does this by focusing on specific aspects of the topic—contextual issues of why cyber-space is the new battleground, defensive cyber weapons, offensive cyber weapons, dual-use weapons, and the implications these weapons systems have for practice. Contrary to popular opinion, the use of cyber weapons is not limited to nation states; though this is where the bulk of news reporting focuses. The reality is that there isn’t a sector of the political-economy that is immune to cyber skirmishes. So, this book looks at cyber weapons not only by national security agencies and the military, but also by law enforcement, and the business sector—the latter includes administrations termed non-government organisations (NGOs). This book offers study material suitable for a wide-ranging audience—students, professionals, researchers, policy officers, and ICT specialists.

Artificial Intelligence and Machine Learning: 33rd Benelux Conference on Artificial Intelligence, BNAIC/Benelearn 2021, Esch-sur-Alzette, Luxembourg, November 10–12, 2021, Revised Selected Papers (Communications in Computer and Information Science #1530)

by Cédric Pruski Amro Najjar Luis A. Leiva Réka Markovich Christoph Schommer

This book contains a selection of the best papers of the 33rd Benelux Conference on Artificial Intelligence, BNAIC/ BENELEARN 2021, held in Esch-sur-Alzette, Luxembourg, in November 2021. The 14 papers presented in this volume were carefully reviewed and selected from 46 regular submissions. They address various aspects of artificial intelligence such as natural language processing, agent technology, game theory, problem solving, machine learning, human-agent interaction, AI and education, and data analysis.

Affiliate Program Management

by Evgenii Prussakov

Affiliate marketing is hot; here's how to get your program goingNearly every retailer in the Internet Retailers' Top 500 has an affiliate marketing program. Now free affiliate networks, automation software, and pay-for-performance compensation models are making it easy for small businesses to take advantage of this marketing tool. In the popular An Hour a Day format, this guide features a detailed, real-world, task-based approach to developing, launching, and managing a successful affiliate marketing program. It explores market research, determining payment models and reporting guidelines, recruiting affiliates, crafting appropriate communications, and much more.Affiliate marketing programs help boost marketing efforts without incurring excessive costs; this Hour a Day guide provides everything merchants, business owners, and those charged with managing an affiliate program need to knowOffers a modern, real-world, step-by-step guide to researching, launching, managing, and optimizing a successful affiliate marketing programCovers social media; creating policies; working with feeds, coupons, widgets, and video; creating compelling content; handling partners who are not meeting goals; and much moreAffiliate Program Management: An Hour a Day is the do-it-yourself guide to planning and maintaining a successful affiliate program.

Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

by Narayan Prusty

Implement blockchain principles in your choice of domain using Ethereum Key FeaturesBuild permissioned enterprise-grade blockchain applications from scratchImplement Blockchain-as-a-Service to enterprises in terms of deployment and securityAchieve privacy in blockchains using proxy re-encryption algorithmsBook DescriptionThe increasing growth in blockchain use is enormous, and it is changing the way business is done. Many leading organizations are already exploring the potential of blockchain. With this book, you will learn to build end-to-end enterprise-level decentralized applications and scale them across your organization to meet your company's needs. This book will help you understand what DApps are and how the blockchain ecosystem works, via real-world examples. This extensive end-to-end book covers every blockchain aspect for business and for developers. You will master process flows and incorporate them into your own enterprise. You will learn how to use J.P. Morgan’s Quorum to build blockchain-based applications. You will also learn how to write applications that can help communicate enterprise blockchain solutions. You will learn how to write smart contracts that run without censorship and third-party interference.Once you've grasped what a blockchain is and have learned about Quorum, you will jump into building real-world practical blockchain applications for sectors such as payment and money transfer, healthcare, cloud computing, supply chain management, and much more.What you will learnLearn how to set up Raft/IBFT Quorum networksImplement Quorum's privacy and security featuresWrite, compile, and deploy smart contractsLearn to interact with Quorum using the web3.js JavaScript libraryLearn how to execute atomic swaps between different networksBuild a secured Blockchain-as-a-Service for efficient business processesAchieve data privacy in blockchains using proxy re-encryptionWho this book is forThis book is for innovators, digital transformers, and blockchain developers who want to build end-to-end, decentralized applications using the blockchain technology. If you want to scale your existing blockchain system across the enterprise, you will find this book useful, too. It adopts a practical approach to solving real problems in enterprises using a blend of theory and practice.

Building Blockchain Projects

by Narayan Prusty

This book is for JavaScript developers who now want to create tamper-proof data (and transaction) applications using Blockchain and Ethereum. Those who are interested in cryptocurrencies and the logic and database empowering it will find this book extremely useful.

Learning ECMAScript 6

by Narayan Prusty

If you are a JavaScript developer with basic development, and now want to learn about the latest features in order to develop better client-side programs with JavaScript, then this book is for you.

Refine Search

Showing 38,901 through 38,925 of 54,399 results