Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
TIBCO Architecture Fundamentals (TIBCO Press)
TIBCO Architecture Fundamentals (TIBCO Press)

TIBCO’s product suite comprises a diverse range of components. Each component is specialized for a particular functionality, ranging from basic messaging through services, service orchestration, the management of complex business processes, managing master data across...

God's Arbiters: Americans and the Philippines, 1898-1902 (Imagining the Americas)
God's Arbiters: Americans and the Philippines, 1898-1902 (Imagining the Americas)

When the U.S. liberated the Philippines from Spanish rule in 1898, the exploit was hailed at home as a great moral victory, an instance of Uncle Sam freeing an oppressed country from colonial tyranny. The next move, however, was hotly contested: should the U.S. annex the archipelago? The disputants did agree on one point: that the United...

IBM System Storage Solutions Handbook
IBM System Storage Solutions Handbook

This IBM® Redbooks® publication provides overviews and pointers for information about the most current IBM System StorageTM products, showing how IBM delivers the right mix of products for nearly every aspect of business continuance and business efficiency. IBM System Storage products can help you store, safeguard, retrieve, and share...

Achieving Extreme Performance with Oracle Exadata (Osborne ORACLE Press Series)
Achieving Extreme Performance with Oracle Exadata (Osborne ORACLE Press Series)

You are holding the first comprehensive book covering the Oracle Exadata Database Machine. You might be holding this book because of your desire to know more about exactly what this technology can do for you, but you and your fellow readers have come to this place from different starting points. You could be investigating the Exadata...

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

One of the most mysterious areas of information security is industrial system security.
No other area of information security contains that many myths, mistakes, misconceptions
and outright lies. Information available online, while voluminous, will
only lead information security professionals and industrial systems
...

Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
Essential App Engine: Building High-Performance Java Apps with Google App Engine (Developer's Library)
A single hype is not enough to change the world. But multiple hypes together can change it as long as they are part of a bigger trend.

This book discusses more than one hyped technology: cloud computing, NoSQL, and HTML5. The technologies in this book combine well with other hyped technologies: functional
...
Troubleshooting SQL Server - A Guide for the Accidental DBA
Troubleshooting SQL Server - A Guide for the Accidental DBA
I've spent much of the last six years of my working life trying to help people solve SQL Server-related performance problems, either hands-on, at client sites in my capacity as a consultant, or on various online community forums, answering people's questions.

Over that time I've been exposed to a few weird
...
Robot Builder's Bonanza, 4th Edition
Robot Builder's Bonanza, 4th Edition

Which of these fields are involved in robotics? You may choose from the following: engineering, electronics, psychology, sociology, biology, physics, artificial intelligence, math, art, mechanical design, mechanical construction, computer programming, sound synthesis, vision, ultrasonics, linguistics, microelectronics, process control,...

Information Technology for Management: Improving Strategic and Operational Performance
Information Technology for Management: Improving Strategic and Operational Performance
Students graduating today face a tough job market—making it important that they develop the expertise and critical thinking skills that give them a competitive edge. Information Technology for Management, 8th edition is designed to give students an edge when they face the challenges and opportunities that business...
IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...

Pro Android Python with SL4A
Pro Android Python with SL4A

This book is about writing real-world applications for the Android platform primarily using the Python language and a little bit of JavaScript. While there is nothing wrong with Java, it really is overkill when all you need to do is turn on or off a handful of settings on your Android device. The Scripting Layer for Android (SL4A)...

Principles of Information Security
Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the smooth operation of communication and computing solutions becomes vital. However, recurring events such as virus and worm attacks and the success of criminal attackers illustrate the weaknesses in current information technologies and the...
Result Page: Previous 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy