Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Performance Analysis and Optimization of Multi-Traffic on Communication Networks
Performance Analysis and Optimization of Multi-Traffic on Communication Networks

Promptly growing demand for telecommunication services and information interchange has led to the fact that communication became one of the most dynamical branches of an infrastructure of a modern society. The book introduces to the bases of classical MDP theory; problems of a finding optimal САС in models are investigated and...

C# Programming: From Problem Analysis to Program Design
C# Programming: From Problem Analysis to Program Design

C# Programming: From Problem Analysis to Program Design requires no previous introduction to programming and only a mathematical background of high school algebra. The book uses C# as the programming language for software development; however, the basic programming concepts presented can be applied to a number of other languages....

Learn Java for Android Development
Learn Java for Android Development

Learn Java for Android Development, Third Edition, is an update of a strong selling book that now includes a primer on Android app development (in Chapter 1 and Appendix C, which is distributed in the book’s code archive).  This book teaches programmers the essential Java language skills necessary for...

Office 2016 For Seniors For Dummies
Office 2016 For Seniors For Dummies

Keep up with the latest Office technologies, and learn the fundamentals of Microsoft Office 2016!

Office 2016 For Seniors For Dummies is the ideal resource for learning the fundamentals of the Microsoft Office suite. You'll explore the functionality of Word, Excel, PowerPoint, and Outlook, establishing basic...

Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

Nelson Essentials of Pediatrics, 5E with STUDENT CONSULT Access Fifth Edition(Nelson Essentials of Pediatrics)
Nelson Essentials of Pediatrics, 5E with STUDENT CONSULT Access Fifth Edition(Nelson Essentials of Pediatrics)

Completely revised and updated, this reference of choice for students and practitioners offers practical guidance and the latest information on normal growth and development, along with the diagnosis, management, and prevention of common childhood diseases and disorders. Discussions of the pathophysiologic aspects of pediatric disease, the...

Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring
Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring
Gain all the essentials you need to create scalable microservices, which will help you solve real challenges when deploying services into production. This book will take you through creating a scalable data layer with polygot persistence. You’ll cover data access and query patterns in Spring and JPA in high-performance...
Cognitive Superiority: Information to Power
Cognitive Superiority: Information to Power

In a world of accelerating unending change, perpetual surveillance, and increasing connectivity, conflict has become ever more complex. Wars are no longer limited to the traditional military conflict domains?land, sea, air; even space and cyber space. The new battlefield will be the cognitive domain and the new conflict a larger...

Design Patterns in Python: Common GOF (Gang of Four) Design Patterns implemented in Python
Design Patterns in Python: Common GOF (Gang of Four) Design Patterns implemented in Python

*** Book also provides you FREE Access to Online Instructional Videos. See video codes in the book ***

This book is about the 23 common GoF (Gang of Four) Design Patterns implemented and in Python.

A Design Pattern is a description or template that can be repeatedly applied to a commonly recurring...

Database Programming with JDBC and Java
Database Programming with JDBC and Java

Java and databases make a powerful combination. Getting the two sides to work together, however, takes some effort--largely because Java deals in objects while most databases do not.

This book describes the standard Java interfaces that make portable object-oriented access to relational databases possible and offers a robust
...

Sams Teach Yourself ASP.NET in 21 Days, Second Edition
Sams Teach Yourself ASP.NET in 21 Days, Second Edition
Sams Teach Yourself ASP.NET in 21 Days, Second Edition offers an approachalbe guide to the latest in Microsoft .NET technologies. The author's example-packed and accessible presentation style helped make the previous edition a success. The book walks the reader through the .NET...
J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

unlimited object storage image
Result Page: 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy