Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Comet and Reverse Ajax: The Next-Generation Ajax 2.0 (Firstpress)
Comet and Reverse Ajax: The Next-Generation Ajax 2.0 (Firstpress)
One of the most basic laws of a web application is that the client, not the server, must initiate any communication between the two. There are a number of common–use cases where, ideally, the server would like to talk to the client—dashboards and monitoring apps, chat rooms and other collaborations, and progress reports on...
Marketing Strategy Masterclass
Marketing Strategy Masterclass

The very best business isn’t born out of hunches, macho tactical skirmishing or simply ‘being busy’, but is the product of careful calculation and understanding customers’ needs, wants and aspirations. Marketing Strategy Masterclass is a ‘how to’ book of marketing strategy focused on doing what our...

Digital Signal Processing: An Introduction with MATLAB and Applications
Digital Signal Processing: An Introduction with MATLAB and Applications

In three parts, this book contributes to the advancement of engineering education and that serves as a general reference on digital signal processing. Part I presents the basics of analog and digital signals and systems in the time and frequency domain. It covers the core topics: convolution, transforms, filters, and random signal analysis....

Psych Yourself Rich: Get the Mindset and Discipline You Need to Build Your Financial Life
Psych Yourself Rich: Get the Mindset and Discipline You Need to Build Your Financial Life

The arrival of this book and its message, I suspect, could not have been better timed. We’re more than two years into this great recession, and many of us are more confused than ever about our personal finances. With the financial and employment landscapes evolving before us, it’s difficult to return to the old, prescriptive...

Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Beginning POJOs: Lightweight Java Web Development Using Plain Old Java Objects in Spring, Hibernate, and Tapestry
Beginning POJOs: Lightweight Java Web Development Using Plain Old Java Objects in Spring, Hibernate, and Tapestry
This book targets beginning to intermediate Java developers looking to build enterprise Web applications with the latest offerings from the open source Java community. In this book you’ll explore different approaches to building a Java Web application using a step-by-step approach.

Java’s history is a thorny and convoluted
...
CISSP For Dummies (Computer/Tech)
CISSP For Dummies (Computer/Tech)

Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying...

Handbook of Human Factors in Web Design, Second Edition (Human Factors and Ergonomics)
Handbook of Human Factors in Web Design, Second Edition (Human Factors and Ergonomics)

Since the World Wide Web became widely available in the mid 1990s, Web-based applications have developed rapidly. The Web has come to be used by a range of people for many different purposes, including online banking, e-commerce, distance education, social networking, data sharing, collaborating on team projects, and...

E-Banking Management: Issues, Solutions, and Strategies
E-Banking Management: Issues, Solutions, and Strategies
"This book will explore issues critical for success in providing e-banking. The aim is to assist organizations in utilising the opportunities offered by this relatively new set of technologies." -Mahmood Shah, University of Central Lancashire, UK"

The provision of services on the Internet has expanded the field
...
McGraw-Hill's GMAT, 2008 Edition
McGraw-Hill's GMAT, 2008 Edition
Welcome to the GMAT. Were we saying this to you in person, we might duck after speaking those words. For many people, there’s nothing remotely welcoming about the GMAT. To many business school applicants, the test appears to be the most painful hurdle they must clear in their admissions process, and the one for which their work experience has...
Enterprise Software Architecture and Design: Entities, Services, and Resources (Quantitative Software Engineering Series)
Enterprise Software Architecture and Design: Entities, Services, and Resources (Quantitative Software Engineering Series)
This book is about programming-in-the-large, a term coined by DeRemer and Kron [2] to distinguish the assembly of large applications from components, from the task of implementing those components themselves. Many of the principles of programming-in-the-large were earlier elucidated by Parnas in two articles [3, 4]. It is...
The Handbook of Banking Technology
The Handbook of Banking Technology
Competitive advantage in banking comes from effective use of technology

The Handbook of Banking Technology provides a blueprint for the future of banking, with deep insight into the technologies at the heart of the industry. The rapid evolution of IT brings continual change and demand for investment — yet...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy