Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Node.js High Performance
Node.js High Performance

Take your application to the next level of high performance using the extensive capabilities of Node.js

About This Book

  • Analyze, benchmark, and profile your Node.js application to find slow spots, and push it to the limit by eliminating performance bottlenecks
  • Learn the basis of...
Harmony Search Algorithm: Proceedings of the 3rd International Conference on Harmony Search Algorithm (ICHSA 2017) (Advances in Intelligent Systems and Computing)
Harmony Search Algorithm: Proceedings of the 3rd International Conference on Harmony Search Algorithm (ICHSA 2017) (Advances in Intelligent Systems and Computing)

This book presents state-of-the-art technical contributions based around one of the most successful evolutionary optimization algorithms published to date: Harmony Search. Contributions span from novel technical derivations of this algorithm to applications in the broad fields of civil engineering, energy, transportation &...

Practical Standards for Microsoft Visual Basic .NET
Practical Standards for Microsoft Visual Basic .NET

Microsoft Visual Basic has the largest user base of any development language in the world, and the ranks are growing. Estimates put the number of users of Visual Basic at about 3 million. Once considered a hobbyist's language, Visual Basic has quickly gained the respect of serious developers and is now widely used in...

Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
An organized, methodical, real-world approach to the complex process of information technology outsourcing.

McDonnell Douglas, Delta, Lufthansa, Hughes Electronics, Hertz, Chase Manhattan, Herman's Sporting Goods, John Wiley & Sons, Proctor & Gamble ... these are just a few of the hundreds of companies that have...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Testing with F#
Testing with F#

Deliver high-quality, bug-free applications by testing them with efficient and expressive functional programming

About This Book

  • Maximize the productivity of your code using the language features of F#
  • Leverage tools such as FsUnit, FsCheck, Foq, and TickSpec to run tests both inside and...
Introducing Microsoft® Silverlight(TM) 3
Introducing Microsoft® Silverlight(TM) 3

As the Web grows and evolves, so do the expectations of the Web user. When the first Web browser was developed, it was created to provide a relatively simple way to allow hyperlinking between documents. Then these early browsers were coupled with the cross-machine protocols encompassing the Internet, and suddenly documents stored on...

Knowledge Exploration in Life Science Informatics: International Symposium KELSI 2004, Milan, Italy, November 25-26, 2004
Knowledge Exploration in Life Science Informatics: International Symposium KELSI 2004, Milan, Italy, November 25-26, 2004
This volume of the Springer Lecture Notes in Computer Science series contains the contributions presented at the International Symposium on Knowledge Exploration in Life Science Informatics (KELSI 2004) held in Milan, Italy, 25–26 November 2004.

The two main objectives of the symposium were:

To explore the symbiosis
...
View Updating and Relational Theory (Theory in Practice)
View Updating and Relational Theory (Theory in Practice)

Views are virtual tables. That means they should be updatable, just as "real" or base tables are. In fact, view updatability isn’t just desirable, it’s crucial, for practical reasons as well as theoretical ones. But view updating has always been a controversial topic. Ever since the relational...

Beginning Backdrop CMS
Beginning Backdrop CMS

Learn what Backdrop CMS is and how it fulfills the role of a content management system, along with how to install and configure it. This book teaches how to create and manage content, taxonomy, users, page layouts, and menus to get the best site possible. You'll also see how to install on shared hosting – which is...

Beginning Groovy and Grails: From Novice to Professional (Beginning from Novice to Professional)
Beginning Groovy and Grails: From Novice to Professional (Beginning from Novice to Professional)
The year 2005 was a traumatic year for the Java web application development community. It was under fire for the unnecessary “fat” architecture of Java Platform, Enterprise Edition (Java EE) systems compared to the new kids on the block like Ruby on Rails and Django. The search began for Java’s answer to these frameworks. I had an...
Intelligent Tutoring Systems: 10th International Conference, ITS 2010, Pittsburgh, PA
Intelligent Tutoring Systems: 10th International Conference, ITS 2010, Pittsburgh, PA

The 10th International Conference on Intelligent Tutoring Systems, ITS 2010, continued the bi-annual series of top-flight international conferences on the use of advanced educational technologies that are adaptive to users or groups of users. These highly interdisciplinary conferences bring together researchers in the learning sciences,...

unlimited object storage image
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy