Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Deploying Chromebooks in the Classroom: Planning, Installing, and Managing Chromebooks in Schools and Colleges
Deploying Chromebooks in the Classroom: Planning, Installing, and Managing Chromebooks in Schools and Colleges

Learn how to deploy Chromebook computers in a classroom or lab situation and how to navigate the hardware and software choices you face.

This book equips you with the skills and knowledge to plan and execute a deployment of Chromebook computers in the classroom.  Teachers and IT administrators at schools will...

Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
Product Management Essentials: Tools and Techniques for Becoming an Effective Technical Product Manager
Product Management Essentials: Tools and Techniques for Becoming an Effective Technical Product Manager
Gain all of the techniques, teachings, tools, and methodologies required to be an effective first-time product manager. The overarching goal of this book is to help you understand the product manager role, give you concrete examples of what a product manager does, and build the foundational skill-set that will gear you towards...
Beginning Entity Framework Core 2.0: Database Access from .NET
Beginning Entity Framework Core 2.0: Database Access from .NET
Use the valuable Entity Framework Core 2.0 tool in ASP.NET and the .NET Framework to eliminate the tedium around accessing databases and the data they contain.

Entity Framework Core 2.0 greatly simplifies access to relational databases such as SQL Server that are commonly deployed in corporate settings.
...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Plan Your Financial Future: A Comprehensive Guidebook to Growing Your Net Worth
Plan Your Financial Future: A Comprehensive Guidebook to Growing Your Net Worth

Get your financial life in order. This comprehensive and objective guidebook will help you grow your net worth on a steady and increasing basis, regardless of your income level.

This new and expanded edition covers changes and strategies to maximize financial benefits and planning resulting from the recent tax legislation,
...
Microsoft Computer Vision APIs Distilled: Getting Started with Cognitive Services
Microsoft Computer Vision APIs Distilled: Getting Started with Cognitive Services
Artificial intelligence is growing in importance, and many devices and applications already use sophisticated algorithms to improve people’s lives and business tasks.

As developers, getting familiar with artificial intelligence is extremely important so we can start thinking about the next generation of
...
Domain-Specific Languages in R: Advanced Statistical Programming
Domain-Specific Languages in R: Advanced Statistical Programming

Gain an accelerated introduction to domain-specific languages in R, including coverage of regular expressions. This compact, in-depth book shows you how DSLs are programming languages specialized for a particular purpose, as opposed to general purpose programming languages. Along the way, you’ll learn to specify tasks...

DBA Transformations: Building Your Career in the Transition to On-Demand Cloud Computing and Extreme Automation
DBA Transformations: Building Your Career in the Transition to On-Demand Cloud Computing and Extreme Automation
A book like this has been a long time coming. Being a DBA is not an easy calling – especially in today’s world. There was a time when DBAs were prized keepers of data within organizations. What we did was a mystery to most, but the role was somewhat predictable. With the introduction of IaaS, PaaS, SaaS, machine...
Swift 4 for Absolute Beginners: Develop Apps for iOS
Swift 4 for Absolute Beginners: Develop Apps for iOS

Stay motivated and overcome obstacles while learning to use Swift Playgrounds to be a great iOS developer. This book is perfect for those with no programming background, those with some programming experience but no object-oriented experience, or those that have a great idea for an app but haven’t programmed since school, and...

Beginning STM32: Developing with FreeRTOS, libopencm3 and GCC
Beginning STM32: Developing with FreeRTOS, libopencm3 and GCC

Using FreeRTOS and libopencm3 instead of the Arduino software environment, this book will help you develop multi-tasking applications that go beyond Arduino norms. In addition to the usual peripherals found in the typical Arduino device, the STM32 device includes a USB controller, RTC (Real Time Clock), DMA (Direct Memory Access...

Cosmos DB for MongoDB Developers: Migrating to Azure Cosmos DB and Using the MongoDB API
Cosmos DB for MongoDB Developers: Migrating to Azure Cosmos DB and Using the MongoDB API
Learn Azure Cosmos DB and its MongoDB API with hands-on samples and advanced features such as the multi-homing API, geo-replication, custom indexing, TTL, request units (RU), consistency levels, partitioning, and much more. Each chapter explains Azure Cosmos DB’s features and functionalities by...
Result Page: 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy