Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Tabular Modeling Cookbook
Microsoft Tabular Modeling Cookbook

No prior knowledgeof tabular modeling is needed to benefit from this brilliant cookbook. This is the total guide to developing and managing analytical models using the Business Intelligence Semantic Models technology.

Overview

  • Develop tabular models for personal use
  • Learn about the modeling...
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development

Understand the Blockchain revolution and get to grips with Ethereum, Hyperledger Fabric, and Corda.

Key Features

  • Resolve common challenges and problems faced in the Blockchain domain
  • Study architecture, concepts, terminologies, and Dapps
  • Make smart choices...
Macroeconomic Policy in Fragile States
Macroeconomic Policy in Fragile States
Setting macroeconomic policy is especially difficult in fragile states. Political legitimacy concerns are heightened, raising issues such as who the policymakers are, what incentives they face, and how the process of policymaking is likely to work under limited legitimacy and high uncertainty
both about the macroeconomic environment
...
Secure Messaging with Microsoft  Exchange Server 2003
Secure Messaging with Microsoft Exchange Server 2003

Get expert guidance to assess and help improve the security of your Exchange Server 2003 messaging systems. From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange...

Professional Software Testing with Visual Studio 2005 Team System: Tools for Software Developers and Test Engineers (Programmer to Programmer)
Professional Software Testing with Visual Studio 2005 Team System: Tools for Software Developers and Test Engineers (Programmer to Programmer)
With the introduction of Visual Studio 2005 Team System (VSTS), Microsoft for the first time offers software developers and test engineers a complete and integrated suite of tools for software testing. This authoritative book shares with you best practices for software testing using VSTS test and development tools and covers all phases of the...
Mac OS X: The Missing Manual, Panther Edition
Mac OS X: The Missing Manual, Panther Edition
Apple says that Mac OS X 10.3 introduces 150 new features--but that's not really true. In fact, "Panther" includes many more than that. It's faster, more polished, and much more efficient. But it still comes without a manual. With 300,000 copies in print, the first two versions of this book became industry bestsellers. Now David...
The Art of Multiprocessor Programming
The Art of Multiprocessor Programming
The first text and reference on this sea change in the computer industry

This book is the first comprehensive presentation of the principles and tools available for programming multiprocessor machines. It is of immediate use to programmers working with the new architectures. For example, the next generation of computer game
...
Getting Started with Storm
Getting Started with Storm
If you’re reading this, it’s because you heard about Storm somehow, and you’re interested in better understanding what it does, how you can use it to solve various problems, and how it works.

This book will get you started with Storm in a very straightforward and easy way. The
...
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards...
Cisco Router Firewall Security
Cisco Router Firewall Security

The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches...

Business Continuity Planning and HIPAA: Business Continuity Management in the Health Care Environment
Business Continuity Planning and HIPAA: Business Continuity Management in the Health Care Environment
This book includes the precautions and procedures that address the concerns of HIPAA, but presents them along with other business components in order to emphasize the need for a holistic approach when constructing and maintaining a business plan.

This book examines business continuity planning as adapted to encompass the requirements of...

Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000
Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000

Although numerous books on security are available, many of them cover only theory or perhaps a security silo—that is, an island of security based on a particular tool, application, or technology. It should be obvious that no complete security solution is a silo; all secure business applications touch many tools and many technologies. Also,...

unlimited object storage image
Result Page: 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy