Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Modern Database Management (8th Edition)
Modern Database Management (8th Edition)

STUDY.MODERN DATABASE MANAGEMENT WITH THE LATEST COVERAGE!

  • Complete SQL Coverage! Now two full chapters on SQL (Chapters 7 and 8) provide a thorough introduction to SQL, plus advanced material with examples.
  • Internet Database...
Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks
Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks
This book describes, analyzes, and recommends traffic engineering (TE) and quality of service (QoS) optimization methods for integrated voice/data dynamic routing networks. These functions control a network's response to traffic demands and other stimuli, such as link failures or node failures. TE and QoS optimization is concerned with measurement,...
Coaching Made Easy: Step-By-Step Techniques That Get Results
Coaching Made Easy: Step-By-Step Techniques That Get Results

Have you ever wanted to make change happen more easily? Do you want to harness the power of coaching? If so help is at hand, as the simple three-step process in this book can help anyone become a coaching expert.

Easy to understand and apply, the authors’ ABC technique will give you a solid understanding of what to do and when to...

New Perspectives on HTML, XHTML, and XML (New Perspectives)
New Perspectives on HTML, XHTML, and XML (New Perspectives)

The New Perspectives Series’ critical-thinking, problem-solving approach is the ideal way to prepare students to transcend point-and-click skills and take advantage of all that the World Wide Web has to offer.

Our goal in developing the New Perspectives Series was to create books that give students the software concepts...

Learning to Solve Problems: A Handbook for Designing Problem-Solving Learning Environments
Learning to Solve Problems: A Handbook for Designing Problem-Solving Learning Environments

This book provides a comprehensive, up-to-date look at problem solving research and practice over the last fifteen years. The first chapter describes differences in types of problems, individual differences among problem-solvers, as well as the domain and context within which a problem is being solved. Part one describes six kinds...

WordPress Web Application Development
WordPress Web Application Development

Developing WordPress-powered websites is one of the standout trends in the modern web development world. The flexibility and power of the built-in features offered by WordPress has made developers turn their attentions to the possibility of using it as a web development framework. This book will act as a comprehensive resource for building...

CUDA Fortran for Scientists and Engineers: Best Practices for Efficient CUDA Fortran Programming
CUDA Fortran for Scientists and Engineers: Best Practices for Efficient CUDA Fortran Programming

CUDA Fortran for Scientists and Engineers shows how high-performance application developers can leverage the power of GPUs using Fortran, the familiar language of scientific computing and supercomputer performance benchmarking. The authors presume no prior parallel computing experience, and cover the basics along with best practices...

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

EDGE for Mobile Internet
EDGE for Mobile Internet
This ground-breaking resource offers you a detailed treatment of EDGE and its critical role in the development of the mobile Internet. The book explains how this global radio based high-speed mobile data standard can be introduced into GSM/GPRS networks, improving data transmission speeds to support multimedia services. It enables you to become...
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Advanced Java 2 Platform: How to Program (With CD-ROM)
Advanced Java 2 Platform: How to Program (With CD-ROM)
The authoritative DEITEL LIVE-CODE guide to programming with the Java 2 Enterprise (J2SE), Standard (J2SE) and Micro (J2ME) Editions

Java has revolutionized application and enterprise-systems...

Theoretical Introduction to Programming
Theoretical Introduction to Programming
Including easily digested information about fundamental techniques and concepts in software construction, this book is distinct in unifying pure theory with pragmatic details. Driven by generic problems and concepts, with brief and complete illustrations from languages including C, Prolog, Java, Scheme, Haskell and HTML. This book is intended to...
unlimited object storage image
Result Page: 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy