Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
CIOs at Work
CIOs at Work

In CIOs at Work, noted author Ed Yourdon interviews many of the world's most influential chief information officers. You will gain insights from the first CIO of the USA, take a peek into the future with the CIO at Google, learn the unique role IT plays in testing Microsoft applications, and much more.

...

Specification by Example: How Successful Teams Deliver the Right Software
Specification by Example: How Successful Teams Deliver the Right Software

The book you hold in your hands, or see on your screen, is the result of a series of studies of how teams all over the world specify, develop, and deliver the right software, without defects, in very short cycles. It presents the collective knowledge of about 50 projects, ranging from public websites to internal back-office systems....

HTML5 Step by Step
HTML5 Step by Step

Hypertext Markup Language (HTML) is the underlying markup language of the World Wide Web. It’s the common thread that ties together virtually every Web site, from largescale corporate sites such as Microsoft’s to single-page classroom projects at the local grade school.

Don’t let the phrase “markup...

Herbal Supplements: Efficacy, Toxicity, Interactions with Western Drugs, and Effects on Clinical Laboratory Tests
Herbal Supplements: Efficacy, Toxicity, Interactions with Western Drugs, and Effects on Clinical Laboratory Tests

This book focuses on efficacy, toxicity, drug interactions, and abnormal clinical laboratory tests resulting from the use of herbal remedies. Although a few herbal remedies are safe and have efficacy (for example saw palmetto), many herbal remedies are toxic. This book guides in the interpretation of abnormal test results in otherwise healthy...

Oracle Database 11g Release 2 High Availability: Maximize Your Availability with Grid Infrastructure, RAC and Data Guard
Oracle Database 11g Release 2 High Availability: Maximize Your Availability with Grid Infrastructure, RAC and Data Guard

In the first edition of this book, we focused on what we called the "High Availability Database Administrator." However, that term led G to the question of just what is meant by High Availability? As a term bandied about among database administrators, this can have different meanings depending on who is interpreting it, who has to...

Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)
Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)

The rapid growth of the Web in the past two decades has made it the largest publicly accessible data source in the world. Web mining aims to discover useful information or knowledge from Web hyperlinks, page contents, and usage logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized...

Building Parallel, Embedded, and Real-Time Applications with Ada
Building Parallel, Embedded, and Real-Time Applications with Ada

The arrival and popularity of multi-core processors have sparked a renewed interest in the development of parallel programs. Similarly, the availability of low cost microprocessors and sensors has generated a great interest in embedded real-time programs. This book provides students and programmers with traditional backgrounds in...

Creative Visualization For Dummies
Creative Visualization For Dummies

The secret to getting exactly what you want from life — from the man who has!

A businessman who has built up, owned and sold software companies, a nightclub, a bed and breakfast (plus a couple of alehouses), author Robin Nixon knows that worldly success has little to do with the world. It begins with one's...

Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply...

The Book of Ruby: A Hands-On Guide for the Adventurous
The Book of Ruby: A Hands-On Guide for the Adventurous

Ruby is famous for being easy to learn, but most users only scratch the surface of what it can do. While other books focus on Ruby's trendier features, The Book of Ruby reveals the secret inner workings of one of the world's most popular programming languages, teaching you to write clear, maintainable code.

...

Dynamic Economic Decision Making: Strategies for Financial Risk, Capital Markets, and Monetary Policy
Dynamic Economic Decision Making: Strategies for Financial Risk, Capital Markets, and Monetary Policy

A comprehensive analysis of the macroeconomic and financial forces altering the economic landscape

Financial decision-making requires one to anticipate how their decision will not only affect their business, but also the economic environment. Unfortunately, all too often, both private and public sector decision-makers view...

Core Concepts in Data Analysis: Summarization, Correlation and Visualization
Core Concepts in Data Analysis: Summarization, Correlation and Visualization

In this textbook, I take an unconventional approach to data analysis. Its contents are heavily influenced by the idea that data analysis should help in enhancing and augmenting knowledge of the domain as represented by the concepts and statements of relation between them. According to this view, two main pathways for data analysis are...

Result Page: Previous 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy