Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Relational Data Modeling, Second Edition
Beginning Relational Data Modeling, Second Edition

Data storage design, and awareness of how data needs to be utilized within an organization, is of prime importance in ensuring that company data systems work efficiently. If you need to know how to capture the information needs of a business system in a relational database model, but don’t know where to start, then this is the book for...

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Advanced Topics in Global Information Management, Vol. 3
Advanced Topics in Global Information Management, Vol. 3

This is the third book in a series on advanced topics in global information management (GIM). It follows GIM research and progress, and how some scholars challenge the status quo.


Advanced Topics in Global Information Management is the third in a series of books on advance topics in global information management...

UML for the IT Business Analyst: A Practical Guide to Object-Oriented Requirements Gathering
UML for the IT Business Analyst: A Practical Guide to Object-Oriented Requirements Gathering
The IT Business Analyst is one of the fastest growing roles in the IT industry. Business Analysts are found in almost all large organizations and are important members of any IT team whether in the private or public sector. UML for the IT Business Analyst provides a clear, step-by-step guide to how the...
International Security and the United States: An Encyclopedia (Praeger Security International)
International Security and the United States: An Encyclopedia (Praeger Security International)

Shaped by often very dramatic events, international security and the international system have changed significantly in recent years. The conclusion of the Cold War, the emergence of new political systems, the growth of significant threats such as terrorism, and the development of new security doctrines have driven global transformation. These...

SOA in Practice: The Art of Distributed System Design (Theory in Practice)
SOA in Practice: The Art of Distributed System Design (Theory in Practice)
This book demonstrates service-oriented architecture (SOA) as a concrete discipline rather than a hopeful collection of cloud charts. Built upon the author's firsthand experience rolling out a SOA at a major corporation, SOA in Practice explains how SOA can simplify the creation and maintenance of large-scale applications. Whether your...
PHP & MySQL Everyday Apps For Dummies (Computer/Tech)
PHP & MySQL Everyday Apps For Dummies (Computer/Tech)
Includes unique object-oriented coverage!

Complete instructions for building real-world Web applications, with all code on CD

Create six practical applications — two user login-in apps, online catalog, shopping cart, content management system, and Web forum — both in procedural and object-oriented programming....

Rapid Graphs with Tableau 8: The Original Guide for the Accidental Analyst
Rapid Graphs with Tableau 8: The Original Guide for the Accidental Analyst

Tired of boring spreadsheets and data overload from confusing graphs? Master the art of visualization with Rapid Graphs with Tableau 8! Tableau insiders Stephen and Eileen McDaniel expertly provide a hands-on case study approach and more than 225 illustrations that will teach you how to quickly...

PBX Systems for IP Telephony
PBX Systems for IP Telephony
The most efficient (and economical) ways to bring enterprise communication systems into the Digital Age are in this guide, written by the foremost analyst in the markret space. In PBX Systems for IP Telephony, Allan Sulkin--consultant and advisor to Avaya, Siemens, Cisco, NEC, Alcatel and other world-class companies--evaluates...
CompTIA CySA+ Study Guide: Exam CS0-001
CompTIA CySA+ Study Guide: Exam CS0-001

Prepare yourself for the newest CompTIA certification

The CompTIA Cybersecurity Analyst+ (CySA+) Study Guide provides 100% coverage of all exam objectives for the new CySA+ certification. The CySA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis,...

Software Testing with Visual Studio 2010 (Microsoft .NET Development Series)
Software Testing with Visual Studio 2010 (Microsoft .NET Development Series)

AS A PROCES S IMPROVEMENT professional, I have experienced many team challenges. Big challenges. It is not unusual to see teams that seem so perfectly compatible start in excitement only to fizzle in different directions and end up not working together. Products suffer, customers suffer, and ultimately...

The Business Analyst's Handbook
The Business Analyst's Handbook

The Business Analyst (BA) plays an important role as liaison between business stakeholders and the technical team (software developers, vendors, etc.), ensuring that business needs are reflected in any software solution. Despite the importance of the job, there is currently no book specifically designed as a comprehensive reference manual for...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy