Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Mapping: Geospatial Development with Bing Maps and C#
Microsoft Mapping: Geospatial Development with Bing Maps and C#

Geospatial mapping applications have become hugely popular in recent years. With smart-phone and tablet numbers snow-balling this trend looks set to continue well into the future. Indeed, it is true to say that in today’s mobile world location-aware apps are becoming the norm rather than the exception. 

In
...

An Introduction to Algorithmic Trading: Basic to Advanced Strategies (Wiley Trading)
An Introduction to Algorithmic Trading: Basic to Advanced Strategies (Wiley Trading)

Interest in algorithmic trading is growing massively – it’s cheaper, faster and better to control than standard trading, it enables you to ‘pre-think’ the market, executing complex math in real time and take the required decisions based on the strategy defined. We are no longer limited by human ‘bandwidth’....

Professional Windows 8 Programming: Application Development with C# and XAML
Professional Windows 8 Programming: Application Development with C# and XAML
IT SEEMS LIKE YESTERDAY that Microsoft announced at its first annual BUILD conference the upcoming game-changing operating system: Windows 8. In the Microsoft world for the first time, Windows 8 was to provide an operating system that could create an ecosystem of apps that ran among phones, desktop computers, and tablets. Developers...
Professional Website Performance: Optimizing the Front-End and Back-End
Professional Website Performance: Optimizing the Front-End and Back-End

THE PAST DECADE has seen an increased interest in website performance, with businesses of all sizes realizing that even modest changes in page loading times can have a signifi cant effect on their profi ts. The move toward a faster web has been driven largely by Yahoo! and Google, which have both carried out extensive research on the subject...

Engineering Design via Surrogate Modelling: A Practical Guide
Engineering Design via Surrogate Modelling: A Practical Guide
Think of a well-known public personality whom you could easily identify from a photograph. Consider now whether you would still recognize them if most of the photograph was obscured, except for the corner of an eye, a small part of their chin and, perhaps, a half of their mouth. This is a game often played on television quiz shows...
Pro JavaScript Performance: Monitoring and Visualization
Pro JavaScript Performance: Monitoring and Visualization

Performance is a hugely important area of web development. If your site runs slowly, users are going to leave, and the problem only grows as your site gets more popular. Pro JavaScript Performance gives you the tools you need to keep your sites smooth and responsive no matter how many users you have.

Best
...

Mac Application Development by Example Beginner's Guide
Mac Application Development by Example Beginner's Guide

It's never been more important to have the ability to develop an App for Mac OS X. Whether it's a System Preference, a business app that accesses information in the Cloud, or an application that uses multi-touch or uses a camera, you will have a solid foundation in app development to get the job done.

Mac Application...

The Gale Encyclopedia of Alternative Medicine - 4 Volume set
The Gale Encyclopedia of Alternative Medicine - 4 Volume set

The Gale Encyclopedia of Alternative Medicine is a medical reference product designed to inform and educate readers about a wide variety of complementary therapies and herbal remedies and treatments for prevalent conditions and diseases. Thomson Gale believes the product to be comprehensive, but not necessarily definitive. It is intended to...

A Manager's Guide to IT Law
A Manager's Guide to IT Law
Since the 1940s, when the computer first made its appearance, there has been a tremendous change in both the power and the extent of IT technology. It has evolved from mainframes through personal computers with packaged applications and client–server architectures, to the explosion of networking in the 1990s which led to...
Managing Risk and Information Security: Protect to Enable
Managing Risk and Information Security: Protect to Enable
Newly promoted CISOs rapidly realize that the scope of the position they have taken on is often beyond what they have been prepared for. The nature of securing an enterprise is daunting and overwhelming. There are no simple checklists or roadmaps for success. Many of the technical security skills a CISO has acquired during the early...
Cost Optimal and Nearly Zero-Energy Buildings (nZEB): Definitions, Calculation Principles and Case Studies
Cost Optimal and Nearly Zero-Energy Buildings (nZEB): Definitions, Calculation Principles and Case Studies

Cost optimal and nearly zero energy performance levels are principles initiated by the European Union’s (EU) Energy Performance of Buildings Directive which was recast in 2010. These will be major drivers in the construction sector in the next few years, because all new buildings in the EU from 2021 onwards are expected to be nearly...

Instant Metasploit Starter
Instant Metasploit Starter

The Metasploit framework is an exploit development framework. It has evolved as a one stop shop for all the needs of ethical hacking. For a beginner who wishes to learn the framework and domain, Metasploit provides everything to make your life easier and secure your world from attackers.

This book is written in such a way that...

Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy