Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algorithms of the Intelligent Web
Algorithms of the Intelligent Web
Web 2.0 applications provide a rich user experience, but the parts you can't see are just as important-and impressive. They use powerful techniques to process information intelligently and offer features based on patterns and relationships in data. Algorithms of the Intelligent Web shows readers how to use the same techniques employed by...
The Meltdown Years: The Unfolding of the Global Economic Crisis
The Meltdown Years: The Unfolding of the Global Economic Crisis

The Meltdown Years offers the most lucid and useful explanation to date about why home values, life savings, job security, and investments around the world are in peril.

Rather than focus on who is to blame, though, author Wolfgang Münchau takes the more practical approach of focusing on...

The Everyday Internet All-in-One Desk Reference for Dummies
The Everyday Internet All-in-One Desk Reference for Dummies
8 books in 1 -- simplify your life with Internet tools
Your one-stop guide to using online resources, keeping in touch, and having fun!
The Internet is a worldwide workplace, a giant communications network, a vast playground, and there's a minibook here covering each aspect of it. Find out about e-mail, researching on the Web,
...
Web Application Vulnerabilities: Detect, Exploit, Prevent
Web Application Vulnerabilities: Detect, Exploit, Prevent
This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,...
Advanced Database Technology and Design (Artech House Computer Library)
Advanced Database Technology and Design (Artech House Computer Library)
Since computers were introduced to automate organization management,
information system evolution has influenced data management considerably.
Applications demand more and more services from information stored in
computing systems. These new services impose more stringent conditions on
the currently prevailing client/server
...
Collateral Management: A Guide to Mitigating Counterparty Risk (Wiley Finance)
Collateral Management: A Guide to Mitigating Counterparty Risk (Wiley Finance)
Insight into collateral management and its increasing relevance in modern banking

In the wake of recent financial crises, firms of all sizes have adjusted their policies to incorporate more frequent instances of collateral management. Collateral Management: A Guide to Mitigating Counterparty Risk explains the...

Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Sams Teach Yourself Shell Programming in 24 Hours
Sams Teach Yourself Shell Programming in 24 Hours
The vast majority of users utilize the Korn Shell or some variant of the Bourne Shell, such as bash. Sams Teach Yourself Shell Programming in 24 Hours covers these shells. It begins with a generalized tutorial of Unix and tools and then moves into detailed coverage of shell programming. Sams Teach Yourself Shell Programming in 24...
Linux Kernels Internals (2nd Edition)
Linux Kernels Internals (2nd Edition)

Since the introduction of Linix version 1.2 in March 1995, a worldwide community has evolved from programmers who were attracted by the reliability and flexibility of this completely free operating system. Now at version 2.0, Linux is no longer simply the operating system of choice for hackers, but is being successfully employed in commercial...

Principles of Transaction Processing, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Principles of Transaction Processing, Second Edition (The Morgan Kaufmann Series in Data Management Systems)

This book offers a clear, concise guide for anyone involved in developing applications, evaluating products, designing systems, managing databases, or engineering products. It provides an understanding of the internals of transaction processing systems, describing how they work and how best to use them. It includes the architecture of...

Anonymous Communication Networks: Protecting Privacy on the Web
Anonymous Communication Networks: Protecting Privacy on the Web

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.

Addressing the demand for authoritative information on
...

Decision Science in Action: Theory and Applications of Modern Decision Analytic Optimisation (Asset Analytics)
Decision Science in Action: Theory and Applications of Modern Decision Analytic Optimisation (Asset Analytics)

This book provides essential insights into a range of newly developed numerical optimization techniques with a view to solving real-world problems. Many of these problems can be modeled as nonlinear optimization problems, but due to their complex nature, it is not always possible to solve them using conventional optimization theory....

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy