Kamis, 24 Maret 2016

BookDL - 5 new Books


BookDL - 5 new Books

Link to BookDL

Linear and Nonlinear Programming, 4th Edition

Posted: 23 Mar 2016 08:50 PM PDT

This new edition covers the central concepts of practical optimization techniques, with an emphasis on methods that are both state-of-the-art and popular. One major insight is the connection between the purely analytical character of an optimization problem and the behavior of algorithms used to solve a problem. This was a major theme of the first […]

Selenium Essentials

Posted: 23 Mar 2016 08:50 PM PDT

This book will help you seamlessly migrate from Selenium RC to Selenium WebDriver. You will be able to quickly develop automated tests with little effort. Based on popularity, support, and usage, the scripts throughout the book are in Java. We will start off by familiarizing you with the Selenium IDE, teaching you its functions, and […]

Rails, Angular, Postgres, and Bootstrap

Posted: 23 Mar 2016 07:43 PM PDT

As a Rails developer, you care about user experience and performance, but you also want simple and maintainable code. Achieve all that by embracing the full stack of web development, from styling with Bootstrap, building an interactive user interface with AngularJS, to storing data quickly and reliably in PostgreSQL. Take a holistic view of full-stack […]

The Nature of Software Development

Posted: 23 Mar 2016 07:42 PM PDT

You need to get value from your software project. You need it “free, now, and perfect.” We can’t get you there, but we can help you get to “cheaper, sooner, and better.” This book leads you from the desire for value down to the specific activities that help good Agile projects deliver better software sooner, […]

Secure Your Node.js Web Application

Posted: 23 Mar 2016 07:41 PM PDT

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement security best practices and […]

Tidak ada komentar:

Posting Komentar