Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learn Java 12 Programming: A step-by-step guide to learning essential concepts in Java SE 10, 11, and 12
Learn Java 12 Programming: A step-by-step guide to learning essential concepts in Java SE 10, 11, and 12

A comprehensive guide to get started with Java and gain insights into major concepts such as object-oriented, functional, and reactive programming

Key Features

  • Strengthen your knowledge of important programming concepts and the latest features in Java
  • Explore core...
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
The Inside Track to Excelling As a Business Analyst: Soft Skills That Can Accelerate Your Career
The Inside Track to Excelling As a Business Analyst: Soft Skills That Can Accelerate Your Career

The role of the business analyst sits at the intersection of business operations, technology, and change management. The job requires a plethora of both soft skills and technical skills, as it must translate the needs of business users into action items for functional applications. On top of this, in-demand technologies...

MySQL Cookbook
MySQL Cookbook

Along with MySQL's popularity has come a flood of questions about solving specific problems, and that's where this Cookbook is essential. Designed as a handy resource when you need quick solutions or techniques, the book offers dozens of short, focused pieces of code and hundreds of worked-out examples for programmers...

Data Analysis Using SAS Enterprise Guide
Data Analysis Using SAS Enterprise Guide

The present book, Data Analysis Using SAS Enterprise Guide, provides readers with an overview of Enterprise Guide, the newest point-and-click interface from SAS. SAS Enterprise Guide is a graphical user (point-and-click) interface to the main SAS application, having relatively recently replaced the Analyst interface, which itself had replaced...

SOA Modeling Patterns for Service Oriented Discovery and Analysis
SOA Modeling Patterns for Service Oriented Discovery and Analysis

One of the most challenging tasks in today’s business and information technology (IT) environments is to communicate a solution to an organizational problem in a simple manner that can be easily understood by business and IT personnel alike. Is it also arduous to explain in simple words how a remedy to an enterprise concern can be...

Get Ready for OpenID
Get Ready for OpenID
This is the first book written on the OpenID system and it provides comprehensive information to beginners and mid level programmers of OpenID. The book includes topics like: o Introduction to identity management o Creating OpenID identities o Using OpenID to login to web sites o Understanding the OpenID protocol o Structure of OpenID messages o...
Perfect Phrases for Writing Job Descriptions
Perfect Phrases for Writing Job Descriptions

THE RIGHT PHRASE FOR THE RIGHT SITUATION—EVERY TIME

Perfect Phrases for Writing Job Descriptions helps you craft job descriptions that attract the best talent and accurately convey job responsibilities. And after you find that ideal candidate, this valuable resource will assist you with performance reviews, goal...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
A Subject Guide to Quality Web Sites
A Subject Guide to Quality Web Sites

The Web is always moving, always changing. As some Web sites come, others go, but the most effective sites have been well established. A Subject Guide to Quality Web Sites provides a list of key web sites in various disciplines that will assist researchers with a solid starting point for their queries. The sites included in this collection...

Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)

Vast amounts of data are nowadays collected, stored and processed, in an effort to assist in  making a variety of administrative and governmental decisions. These innovative steps considerably improve the speed, effectiveness and quality of decisions. Analyses are increasingly performed by data mining and profiling technologies that...

Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Result Page: 33 32 31 30 29 28 27 26 25 24 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy