Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protocol Engineering
Protocol Engineering

Communication protocols form the operational basis of computer networks and tele­communication systems. They are behavior conventions that describe how com­munication systems inter­act with each other, defining the temporal order of the interactions and the formats of the data units exchanged – essentially they determine the...

Zen Cart: E-commerce Application Development: A step-by-step developer's guide
Zen Cart: E-commerce Application Development: A step-by-step developer's guide

Zen Cart is a popular open-source PHP/MySQL-based e-commerce solution available under GPL that is designed to put the merchants' and shoppers' requirements first. Not only does Zen Cart offer a very long list of features, but the system is designed with both store owners and web developers in mind. There's no sacrifice of usability or power.

...
SharePoint 2010 Web Parts in Action
SharePoint 2010 Web Parts in Action

I really love working with SharePoint! I’ve been doing it full-time for the last half decade, including lots of late nights and weekends. One area that I’ve found particularly interesting is Web Parts. I like the nature of a Web Part since it can act as a standalone application inside the powerful SharePoint platform—or it...

Fully Grown: Why a Stagnant Economy Is a Sign of Success
Fully Grown: Why a Stagnant Economy Is a Sign of Success
Most economists would agree that a thriving economy is synonymous with GDP growth. The more we produce and consume, the higher our living standard and the more resources available to the public. This means that our current era, in which growth has slowed substantially from its postwar highs, has raised alarm bells. But should it?...
IT Portfolio Management: Unlocking the Business Value of Technology
IT Portfolio Management: Unlocking the Business Value of Technology
This book provides a pragmatic, step-by-step road map, describing IT portfolio
management and its major elements. Chapter 1 provides an overview of IT
portfolio management. Chapter 2 describes the planning aspects of IT portfolio
management. It explains the IT portfolio management maturity model and the
key people, process, and
...
ElasticSearch Cookbook
ElasticSearch Cookbook

As a user of ElasticSearch in your web applications you’ll already know what a powerful technology it is, and with this book you can take it to new heights with a whole range of enhanced solutions from plugins to scripting.

Overview

  • Write native plugins to extend the capabilities of ElasticSearch to...
Testing SAP R/3: A Manager's Step-by-Step Guide
Testing SAP R/3: A Manager's Step-by-Step Guide

Destined to become your essential SAP R/3 desktop reference

Testing SAP R/3: A Manager′s Step–by–Step Guide demystifies this powerful software to enable professionals to implement a disciplined, efficient, and proven approach for testing SAP R/3. Providing much needed industry guidance for...

Real Leaders Don't Do PowerPoint: How to Sell Yourself and Your Ideas
Real Leaders Don't Do PowerPoint: How to Sell Yourself and Your Ideas

Think about the most powerful speech you’ve ever heard a leader give. What made that speech–and that speaker–memorable was likely a mix of authenticity, stage presence, masterful delivery, and–above all–an inspirational message.

Nobody ever walked out of a great speech saying, “I loved the
...

Hands-On Data Structures and Algorithms with JavaScript: Write efficient code that is highly performant, scalable, and easily testable using JavaScript
Hands-On Data Structures and Algorithms with JavaScript: Write efficient code that is highly performant, scalable, and easily testable using JavaScript

Increase your productivity by implementing complex data structures and algorithms using JavaScript

Key Features

  • A step by step guide, which will provide you with a thorough discussion on the analysis and design of fundamental JavaScript data structures
  • Get a better...
Data Protection
Data Protection
At first sight, Data Protection may not appear to affect the library professional unduly. The 1998 Data Protection Act only applies to information about people. Most of the material held in a typical library will not be covered.

But this first impression would be wrong. Librarians deal with people every day. They hold information about
...
Adjudicating Climate Change: State, National, and International Approaches
Adjudicating Climate Change: State, National, and International Approaches
The world’s political process has been slow to react to the serious, and potentially catastrophic, consequences for life on our planet that flow from the burning of fossil fuel. In one sense, this is understandable: turning around the global energy base is not a simple task. In another sense, it is inexcusable: a myopic failure to act in the...
Driving Technical Change
Driving Technical Change

Finding cool languages, tools, or development techniques is easy-new ones are popping up every day. Convincing co-workers to adopt them is the hard part. The problem is political, and in political fights, logic doesn't win for logic's sake. Hard evidence of a superior solution is not enough. But that reality can be tough for...

unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy