Home | Amazing | Today | Tags | Publishers | Years | Search 
ADempiere 3.6 Cookbook
ADempiere 3.6 Cookbook

ADempiere is one of the leading open source ERP products in today's business market. ADempiere offers everything you need to make your business successful. Efficient data management, streamlining business processes, reduction in costs, and minimal complexity.

Written in a cookbook style, this book offers solutions using a...

Data Mining: Concepts, Models and Techniques (Intelligent Systems Reference Library)
Data Mining: Concepts, Models and Techniques (Intelligent Systems Reference Library)

Data Mining represents a complex of technologies that are rooted in many disciplines: mathematics, statistics, computer science, physics, engineering, biology, etc., and with diverse applications in a large variety of different domains: business, health care, science and engineering, etc. Basically, data mining can be seen as the science of...

Murach's HTML, XHTML, and CSS (Web Programming)
Murach's HTML, XHTML, and CSS (Web Programming)

If you have anything to do with web development, you should know how to use HTML. XHTML, and CSS the modern, professional way. That's true if you want to become a web designer. That's true for web designers who still use tables for page layout when they should be using CSS. That's true for JavaScript programmers. And that's...

OpenCart 1.4 Template Design Cookbook
OpenCart 1.4 Template Design Cookbook

Templates in OpenCart provide a powerful way to make your site look exactly the way you want either using a single template for the entire site or a separate template for each site section. Although it sounds like an easy task to build and maintain templates, it can be challenging
to get beyond the basics and customize templates to
...

ASP.NET 4 Social Networking
ASP.NET 4 Social Networking

Social networking has become a driving force on the Internet. Many people are part of at least one social network, while more often people are members of many different communities. For this reason many business people are trying to capitalize on this movement and are in a rush to put up their own social network. As the growth of social...

Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop
Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop

Interest in and needs for provenance are growing as data proliferate. Data are increasing in a wide array of application areas, including scientific workflow systems, logical reasoning systems, text extraction, social media, and linked data. As data volumes expand and as applications become more hybrid and distributed in nature, there is...

Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging

The Workshop on Medical Computer Vision (MICCAI-MCV 2010) was held in conjunction with the 13th International Conference on Medical Image Computing and Computer – Assisted Intervention (MICCAI 2010) on September 20, 2010 in Beijing, China. The one-day workshop focused on recognition techniques and applications in medical imaging. The...

Scaling MongoDB
Scaling MongoDB

This text is for MongoDB users who are interested in sharding. It is a comprehensive look at how to set up and use a cluster.

This is not an introduction to MongoDB; I assume that you understand what a document, collection, and database are, how to read and write data, what an index is, and how and why to set up a...

Change Management for Semantic Web Services
Change Management for Semantic Web Services

Software automates a wide variety of business processes in modern enterprises. Changes made to software are, in effect, changes made to the business processes themselves that govern and automate the internal and external operations of an organization.Without a proper disciplined approach to change management, enterprises lack a full...

Implementation and Application of Automata: 15th International Conference, CIAA 2010
Implementation and Application of Automata: 15th International Conference, CIAA 2010

This volume of Lecture Notes in Computer Science contains revised versions of papers presented at the 15th International Conference on Implementation and Application of Automata, CIAA 2010. The conference was held at the University of Manitoba in Winnipeg, Canada, on August 12–15, 2010. The previous CIAA conferences were held in London,...

Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20

Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.”

The theme of our deliberations this...

Open Text Metastorm ProVision® 6.2 Strategy Implementation
Open Text Metastorm ProVision® 6.2 Strategy Implementation

Look around you. Everything that is made has been designed, with one exception: we don't design the very organizations that make the things you see, hear, feel, touch and taste. This is a very curious omission.

Now all this is changing. Visionary organizations have started to do just that – they are designing their...

Result Page: 1342 1341 1340 1339 1338 1337 1336 1335 1334 1333 1332 1331 1330 1329 1328 1327 1326 1325 1324 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy