Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beacon Technologies: The Hitchhiker's Guide to the Beacosystem
Beacon Technologies: The Hitchhiker's Guide to the Beacosystem

Learn the key standards―iBeacon, Eddystone, Bluetooth 4.0, and AltBeacon―and how they work with other proximity technologies. Then build your understanding of the proximity framework and how to identify and deploy the best solutions for your own business, institutional, or consulting needs.

Proximity technology―in...

Windows Server 2003 Bible
Windows Server 2003 Bible
If Windows Server 2003 can do it, you can do it, too ...

This comprehensive reference provides what you need to plan, install, configure, and maintain a Windows Server 2003 R2, SP1, operating system. Covering critical new SP1 security features, the new Windows Update service, and expanded Active Directory...

Professional Visual Studio 2005
Professional Visual Studio 2005
Visual Studio 2005 is an enormous product. Incorporating the latest advances in both Visual Basic® and C# as well as improvements and new features in the user interface, it can be daunting without the kind of guidance this book provides.

In these pages you'll learn to harness every feature of this remarkable development...

The Unified Modeling Language Reference Manual
The Unified Modeling Language Reference Manual

The authors have done an outstanding job with this UML book. The definitions of the terms are the best I have seen. The organization and material in the encyclopedia are fantastic!

--Perry Cole, MCIWorldCom

The Unified Modeling Language (UML) has rapidly become the standard notation for modeling...

Essential Windows Presentation Foundation (WPF) (Microsoft .NET Development Series)
Essential Windows Presentation Foundation (WPF) (Microsoft .NET Development Series)
Windows Presentation Foundation (WPF) replaces Microsoft's diverse presentation technologies with a unified, state-of-the-art platform for building rich applications. WPF combines the best of Windows and the Web; fully integrates user interfaces, documents, and media; and leverages the full power of XML-based declarative programming.

In...

Foundations of Security: What Every Programmer Needs to Know (Expert's Voice)
Foundations of Security: What Every Programmer Needs to Know (Expert's Voice)
Dr. Gary McGraw, a well-known software security expert, said, “First things first—make sure you know how to code, and have been doing so for years. It is better to be a developer (and architect) and then learn about security than to be a security guy and try to learn to code” (McGraw 2004). If you are interested in becoming a...
Architecting Google Cloud Solutions: Learn to design robust and future-proof solutions with Google Cloud technologies
Architecting Google Cloud Solutions: Learn to design robust and future-proof solutions with Google Cloud technologies

Achieve your business goals and build highly available, scalable, and secure cloud infrastructure by designing robust and cost-effective solutions as a Google Cloud Architect.

Key Features

  • Gain hands-on experience in designing and managing high-performance cloud solutions
  • ...
Practical Business Intelligence with SQL Server 2005
Practical Business Intelligence with SQL Server 2005

Design, Build, and Manage High-Value BI Solutions with SQL Server 2005

 

In this book, two of Microsoft’s leading consultants illustrate how to use SQL Server 2005 Business Intelligence (BI) technologies to solve real-world problems in...

Microsoft Application Architecture Guide (Patterns & Practices)
Microsoft Application Architecture Guide (Patterns & Practices)

Get the definitive guide on designing applications on the Microsoft application platform—straight from the Microsoft patterns & practices team. Learn how to choose the most appropriate architecture and the best implementation technologies that the Microsoft application platform offers applications developers. Get critical design...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Sustainable Software Development: An Agile Perspective (Agile Software Development Series)
Sustainable Software Development: An Agile Perspective (Agile Software Development Series)
Software development for immediate success and long-term sustainability

Sustainable Software Development brings together principles and practices for building software that is technically superior, delivers exceptional business value, and can evolve rapidly to reflect any change to your business or technical...

Information Architecture for the World Wide Web: Designing Large-scale Web Sites
Information Architecture for the World Wide Web: Designing Large-scale Web Sites

Some web sites "work" and some don't. Good web site consultants know that you can't just jump in and start writing HTML, the same way you can't build a house by just pouring a foundation and putting up some walls. You need to know who will be using the site, and what they'll be using it for. You need some...

unlimited object storage image
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy