Home | Amazing | Today | Tags | Publishers | Years | Search 
Building Storage Networks
Building Storage Networks

Praise for the first edition of "Building Storage Networks": 'This book is the Bible of storage networking' - Dave Hill, Senior Storage Analyst, the Aberdeen Group. Now more than ever, especially in the age of e-commerce, data must be available and accessible 24x7 on a network. This easy-to-understand book clearly explains...

Determining Project Requirements (ESI International Project Mgmt)
Determining Project Requirements (ESI International Project Mgmt)

Organizations waste millions of dollars every year on failed projects. Failure is practically guaranteed by poor or incomplete requirements that do not properly define projects in their initial stages.  Business analysis is the critical process ensuring projects start on the path toward success. To accurately determine project...

The Sensible Guide to Forex: Safer, Smarter Ways to Survive and Prosper from the Start
The Sensible Guide to Forex: Safer, Smarter Ways to Survive and Prosper from the Start

FXstreet.Com’s 2013 Best Book Award!

The Sensible Guide to Forex: Safer, Smarter Ways to Survive and Prosper from the Start is written for the risk averse, mainstream retail investor or trader seeking a more effective way to tap forex markets to improve returns and hedge currency risk. As the most...

Power Query for Power BI and Excel
Power Query for Power BI and Excel

Power Query for Power BI and Excel is a book for people who are tired of copying and pasting data into Excel worksheets. Power Query, part of the Microsoft Power BI suite, is a tool that automates the process of getting data into Excel and will save you hours of dull, repetitive, and error-prone work! Power Query makes it easy to...

A Basic Course in Probability Theory (Universitext)
A Basic Course in Probability Theory (Universitext)

Introductory Probability is a pleasure to read and provides a fine answer to the question: How do you construct Brownian motion from scratch, given that you are a competent analyst? There are at least two ways to develop probability theory. The more familiar path is to treat it as its own discipline, and work from intuitive examples such as...

Opportunities in Technical Writing (Opportunities in)
Opportunities in Technical Writing (Opportunities in)

Write your way to success!

Get started in a career that has a promising future and is financially rewarding. Opportunities in Technical Writing Careers provides you with a complete overview of the job possibilities, salary figures, and experience required to enter the field of technical writing.

This...

The 5 Keys to Value Investing
The 5 Keys to Value Investing

The investing style that made Warren Buffett the world's wealthiest investor!

Strategies for Identifying Today's Best-Run Corporations--Then Buying Them for Pennies on the Dollar

As an investor, you don't buy stocks; you buy companies. The Five Key Steps to Value Investing shows you how...

Advanced Excel Essentials
Advanced Excel Essentials

Advanced Excel Essentials is the only book for the experienced Excel developer. This book starts from the assumption that you are well-versed in Excel--and builds on your skills to take them to the advanced level. It will show you the building blocks of advanced development and then take you through the development of your own advanced...

Talend for Big Data
Talend for Big Data

If you want to start working on big data projects fast, this is the guide you've been looking for. Delve deep into Talend and discover how just how easily you can revolutionize your data handling and presentation.

Overview

  • Write complex processing job codes easily with the help of clear and step by...
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to...

R for Data Science
R for Data Science

Learn and explore the fundamentals of data science with R

About This Book

  • Familiarize yourself with R programming packages and learn how to utilize them effectively
  • Learn how to detect different types of data mining sequences
  • A step-by-step guide to understanding R scripts...
Practical Salesforce.com Development Without Code: Customizing Salesforce on the Force.com Platform
Practical Salesforce.com Development Without Code: Customizing Salesforce on the Force.com Platform

Are you facing a challenging Salesforce.com problem--say, relating to automation, configuration, formulation, or reporting--that you can't quite crack? Or maybe you are hoping to infuse some creativity into your solution design strategy to solve problems faster or make solutions more efficient? Practical Salesforce.com Development...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy