Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical Salesforce.com Development Without Code: Customizing Salesforce on the Force.com Platform
Practical Salesforce.com Development Without Code: Customizing Salesforce on the Force.com Platform

Are you facing a challenging Salesforce.com problem--say, relating to automation, configuration, formulation, or reporting--that you can't quite crack? Or maybe you are hoping to infuse some creativity into your solution design strategy to solve problems faster or make solutions more efficient? Practical Salesforce.com Development...

R for Data Science
R for Data Science

Learn and explore the fundamentals of data science with R

About This Book

  • Familiarize yourself with R programming packages and learn how to utilize them effectively
  • Learn how to detect different types of data mining sequences
  • A step-by-step guide to understanding R scripts...
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to...

Talend for Big Data
Talend for Big Data

If you want to start working on big data projects fast, this is the guide you've been looking for. Delve deep into Talend and discover how just how easily you can revolutionize your data handling and presentation.

Overview

  • Write complex processing job codes easily with the help of clear and step by...
Determining Project Requirements (ESI International Project Mgmt)
Determining Project Requirements (ESI International Project Mgmt)

Organizations waste millions of dollars every year on failed projects. Failure is practically guaranteed by poor or incomplete requirements that do not properly define projects in their initial stages.  Business analysis is the critical process ensuring projects start on the path toward success. To accurately determine project...

Business Intelligence in Microsoft SharePoint 2013
Business Intelligence in Microsoft SharePoint 2013

Dive into the business intelligence features in SharePoint 2013—and use the right combination of tools to deliver compelling solutions.

Take control of business intelligence (BI) with the tools offered by SharePoint 2013 and Microsoft SQL Server® 2012. Led by a group of BI and SharePoint experts, you’ll...

Essential SharePoint® 2013: Practical Guidance for Meaningful Business Results (3rd Edition)
Essential SharePoint® 2013: Practical Guidance for Meaningful Business Results (3rd Edition)

The Only Book That’s 100% Focused on Maximizing the Business Value of SharePoint 2013

Essential SharePoint® 2013 approaches Microsoft SharePoint 2013 from a strict business value perspective, helping you plan and implement solutions that achieve effective business results.

...
Business Intelligence with MicroStrategy Cookbook
Business Intelligence with MicroStrategy Cookbook

Over 90 practical, hands-on recipes to help you build your MicroStrategy business intelligence project, including more than a 100 screencasts

Overview

  • Learn about every step of the BI project, starting from the installation of a sample database
  • Design web reports and documents
  • ...
Security Information and Event Management (SIEM) Implementation (Network Pro Library)
Security Information and Event Management (SIEM) Implementation (Network Pro Library)

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify,...

Building Storage Networks
Building Storage Networks

Praise for the first edition of "Building Storage Networks": 'This book is the Bible of storage networking' - Dave Hill, Senior Storage Analyst, the Aberdeen Group. Now more than ever, especially in the age of e-commerce, data must be available and accessible 24x7 on a network. This easy-to-understand book clearly explains...

A Basic Course in Probability Theory (Universitext)
A Basic Course in Probability Theory (Universitext)

Introductory Probability is a pleasure to read and provides a fine answer to the question: How do you construct Brownian motion from scratch, given that you are a competent analyst? There are at least two ways to develop probability theory. The more familiar path is to treat it as its own discipline, and work from intuitive examples such as...

The 5 Keys to Value Investing
The 5 Keys to Value Investing

The investing style that made Warren Buffett the world's wealthiest investor!

Strategies for Identifying Today's Best-Run Corporations--Then Buying Them for Pennies on the Dollar

As an investor, you don't buy stocks; you buy companies. The Five Key Steps to Value Investing shows you how...

Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy