Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learn MYSQL: Learn MYSQL For Beginners: Learn How To Create An Address Book Using Php And Mysql
Learn MYSQL: Learn MYSQL For Beginners: Learn How To Create An Address Book Using Php And Mysql

This is the fastest beginner's guide to PHP and MYSQL programming.

The author clarifies things in your opinion so that you don't need to study some specific technique being used in PHP. To keep things as simple as possible, we won't use any complex systems. Besides, he will not focus on website design because...

Agile Workforce Planning: How to Align People with Organizational Strategy for Improved Performance
Agile Workforce Planning: How to Align People with Organizational Strategy for Improved Performance

As business priorities change and focus shifts to address arising issues, HR professionals need to be able to reorganize talent swiftly and plan for future needs to enable the business to succeed. It covers how to forecast organizational demand for people, resources and skills, analyze the gap between supply and demand and most...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)
Seven Concurrency Models in Seven Weeks: When Threads Unravel (The Pragmatic Programmers)

Your software needs to leverage multiple cores, handle thousands of users and terabytes of data, and continue working in the face of both hardware and software failure. Concurrency and parallelism are the keys, and Seven Concurrency Models in Seven Weeks equips you for this new world. See how emerging technologies such as actors and...

Learning Network Programming with Java
Learning Network Programming with Java

Key Features

  • Learn to deliver superior server-to-server communication through the networking channels
  • Gain expertise of the networking features of your own applications to support various network architectures such as client/server and peer-to-peer
  • Explore the issues that impact scalability,...
Risk Management and Capital Adequacy
Risk Management and Capital Adequacy

A Step-by-Step Approach for Integrating Market, Credit, and Operational Risk Management--While Complying with New Basel Accord Guidelines

For financial institutions around the world, the work involved in managing market, credit, and operational risk exposures--as well as the capital required to support such...

Learning Bing Maps API
Learning Bing Maps API

Bing Maps are a great resource and very versatile when you know how. And this book will show you how, covering everything from embedding on a web page to customizing with your own styles and geo-data.

Overview

  • Display address information for any point on the map through the location-based REST services...
Oceans in Decline
Oceans in Decline

What is happening in our oceans? By describing their main elements, this book shows how and why the oceans are being transformed, and suggests possible future scenarios to address this complex, yet often-asked, question. The ocean is being dramatically transformed, but the magnitude of this transformation remains unclear since the...

Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
The application of Data Mining (DM) technologies has shown an explosive growth in an increasing number of different areas of business, government and science. Two of the most important business areas are finance, in particular in banks and insurance companies, and e-business, such as web portals, e-commerce and ad management services.In...
Windows System Programming (4th Edition) (Addison-Wesley Microsoft Technology Series)
Windows System Programming (4th Edition) (Addison-Wesley Microsoft Technology Series)

“If you’re writing a native Win32 program or just want to know what the OS is really doing underneath, you need John’s book. He covers the stuff that real systems programmers absolutely must know. Recommended.”

–Chris Sells, Microsoft Corporation

...
Design Automation Techniques for Approximation Circuits: Verification, Synthesis and Test
Design Automation Techniques for Approximation Circuits: Verification, Synthesis and Test

This book describes reliable and efficient design automation techniques for the design and implementation of an approximate computing system. The authors address the important facets of approximate computing hardware design - from formal verification and error guarantees to synthesis and test of approximation systems. They provide...

unlimited object storage image
Result Page: 140 139 138 137 136 135 134 133 132 131 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy