Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Unified Modeling Language User Guide
The Unified Modeling Language User Guide

Introduced in 1997, the Unified Modeling Language (UML) has rapidly been accepted throughout the software industry as the standard graphical language for specifying, constructing, visualizing, and documenting software-intensive systems. The UML provides anyone involved in the production, deployment, and maintenance of software with a standard...

Professional Visual Studio 2005 Team System (Programmer to Programmer)
Professional Visual Studio 2005 Team System (Programmer to Programmer)
The launch of Microsoft's Visual Studio 2005 Team System (VSTS) is the most significant event in the software development lifecycle tools market for many years, and this book supplies the tools you need to take full advantage of it. Comprising three new role-based editions of Visual Studio, a server-side repository for all software...
Database Nation (Hardback)
Database Nation (Hardback)
Forget the common cold for a moment. Instead, consider the rise of "false data syndrome," a deceptive method of identification derived from numbers rather than more recognizable human traits. Simson Garfinkel couples this idea with concepts like "data shadow" and "datasphere" in Database Nation, offering a...
Perl Fast & Easy Web Development
Perl Fast & Easy Web Development
Don?t spend your time wading through manuals to learn Perl. Spend it doing what you do best?creating Web pages! Perl is quickly developed and results-oriented. With this book, you?ll move seamlessly from the basics of this language to building dynamic Web sites. Combining easy-to-understand instructions with visual examples, Perl Fast &...
Linkage in Evolutionary Computation (Studies in Computational Intelligence)
Linkage in Evolutionary Computation (Studies in Computational Intelligence)
In recent years, the issue of linkage in GEAs has garnered greater attention and recognition from researchers. Conventional approaches that rely much on ad hoc tweaking of parameters to control the search by balancing the level of exploitation and exploration are grossly inadequate. As shown in the work reported here, such parameters tweaking based...
Essentials of Supply Chain Management, Third Edition
Essentials of Supply Chain Management, Third Edition

The latest thinking, strategies and technologies to stay current in supply chain management

Presenting the core concepts and techniques of supply chain management in a clear, concise and easily readable style, the Third Edition of Essentials of Supply Chain Management outlines the most crucial tenets and concepts of supply...
Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Troubleshooting Remote Access Networks (CCIE Professional Development)
Troubleshooting Remote Access Networks (CCIE Professional Development)
A guide to understanding the troubleshooting tools, commands, and methodologies that enable reliable performance for remote access services

* Gain a solid grasp of enterprise telecommunications technology fundamentals, including service options and clocking, line coding, and framing in carrier systems
* Understand how network traffic
...

Forensic Pathology of Trauma (Forensic Science and Medicine)
Forensic Pathology of Trauma (Forensic Science and Medicine)
The practice of forensic pathology includes the collection and analysis of evidence in relation to a corpse in order to establish the cause of death. Knowledge of the cause of death contributes to the determination of the manner of death by medical examiners and coroners, who are occasionally assisted by law enforcement officers. In...
Ganong's Review of Medical Physiology, Twenty sixth Edition
Ganong's Review of Medical Physiology, Twenty sixth Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

The leading text on human physiology for more than four decades?enhanced by all new video tutorials

...

Building Low-Code Applications with Mendix: Discover best practices and expert techniques to simplify enterprise web development
Building Low-Code Applications with Mendix: Discover best practices and expert techniques to simplify enterprise web development

Transform your app ideas into fully functional prototypes with the help of expert tips and best practices from Mendix partners

Key Features

  • Meet the ever-increasing demand for software solution delivery without having to write any code
  • Build high-availability, low-cost...
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign...
unlimited object storage image
Result Page: 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy