Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sams Teach Yourself C++ in 21 Days (5th Edition)
Sams Teach Yourself C++ in 21 Days (5th Edition)
Join the leagues of thousands of programmers and learn C++ from some of the best. The fifth edition of the best seller Sams Teach Yourself C++ in 21 Days, written by Jesse Liberty, a well-known C++ and C# programming manual author and Bradley L. Jones, manager for a number of high profiler developer websites, has been updated to the new...
Next Generation Excel: Modeling in Excel for Analysts and MBAs (Wiley Finance)
Next Generation Excel: Modeling in Excel for Analysts and MBAs (Wiley Finance)

Rutgers professor, Dr. Isaac Gottlieb demonstrates an array of advanced financial and accounting functions in this practical Excel modeling book. He shows how to quickly create models that deliver accurate, relevant information related to efficiency, forecasting, and a host of other business and reporting issues. This book describes how Excel...

Pivot Table Data Crunching (Business Solutions)
Pivot Table Data Crunching (Business Solutions)
Become a savvy Microsoft Excel user. Pivot tables are a great feature in Excel that help you organize and analyze data, but not many Excel users know how to use pivot tables. Pivot Table Data Crunching offers a comprehensive review of all the functionalities of Pivot Tables from author ...
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)

Even bad code can function. But if code isn’t clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn’t have to be that way.

Noted software expert Robert C. Martin presents a revolutionary paradigm with
...

Process Quality Assurance for UML-Based Projects
Process Quality Assurance for UML-Based Projects

Software quality, by its very nature, is elusive. Add to that the issue of ever-changing user requirements and the vagaries of software project management and "quality" can easily become a mere word on a distant horizon. This highly acclaimed book demonstrates how the Unified Modeling Language (UML) can be used within a process...

Real-World Hadoop
Real-World Hadoop

If you’re a business team leader, CIO, business analyst, or developer interested in how Apache Hadoop and Apache HBase-related technologies can address problems involving large-scale data in cost-effective ways, this book is for you. Using real-world stories and situations, authors Ted Dunning and Ellen Friedman show Hadoop...

Perl Scripting for IT Security
Perl Scripting for IT Security
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely...
The Object Primer: Agile Model-Driven Development with UML 2.0
The Object Primer: Agile Model-Driven Development with UML 2.0
Completely up-to-date, with all modeling notation rewritten in the just-released UML 2.0, this is the perfect book for any software development professional or student seeking an introduction to the concepts and terminology of object technology.

Scott Ambler, award-winning author of Building Object Applications that Work, Process...

Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement...

Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Mastering ArcGIS Enterprise Administration: Install, configure, and manage ArcGIS Enterprise to publish, optimize, and secure GIS services
Mastering ArcGIS Enterprise Administration: Install, configure, and manage ArcGIS Enterprise to publish, optimize, and secure GIS services

Key Features

  • Install and configure the components of ArcGIS Enterprise to meet your organization's requirements
  • Administer all aspects of ArcGIS Enterprise through user interfaces and APIs
  • Optimize and Secure ArcGIS Enterprise to make it run efficiently and...
Python Data Analysis Cookbook
Python Data Analysis Cookbook

Key Features

  • Analyze Big Data sets, create attractive visualizations, and manipulate and process various data types
  • Packed with rich recipes to help you learn and explore amazing algorithms for statistics and machine learning
  • Authored by Ivan Idris, expert in python programming and proud...
unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy