|
|
|
|
|
| | Java: Data Science Made Easy
Data collection, processing, analysis, and more
About This Book
-
Your entry ticket to the world of data science with the stability and power of Java
-
Explore, analyse, and visualize your data effectively using easy-to-follow examples
-
A highly practical course covering a broad...
| | Legendary Artists and the Clothes They Wore
Whether it’s Cecil Beaton’s flamboyant, classically tailored suits, Frida Kahlo’s love of bright color, or Cindy Sherman’s penchant for minimalism, an artist’s attire often reflects the creative and spiritual essence of his or her work. In Legendary Artists and the Clothes They Wore, fashion... |
|
Information and Communications Technology for Competitive IntelligenceCompetitive Intelligence can be described as producing and processing information about the environment of an organization for strategic purposes. To formulate a strategy, an organization needs to collect and process information about its environment—about, for instance, competitors, customers, suppliers, governments, technological trends or... | | Beginning ASP.NET 2.0 in VB 2005: From Novice to ProfessionalThe most up-to-date and comprehensive introductory ASP.NET book you'll find on any shelf, Beginning ASP.NET 2.0 in VB 2005 guides you through Microsoft's latest technology for building dynamic websites. You'll learn to build dynamic web pages quickly, with only basic prior knowledge of Visual Basic. Included is thorough coverage of... | | JSTL: JSP Standard Tag Library Kick StartThe JSP Standard Tag Library is a collection of commonly used functions and tools invaluable to JSP developers to avoid re-creating the same functions on site after site. Sun has indicated that JSP development should be based around using tag libraries going forward, and will relase JSP STL, as their official library. This book starts with an... |
|
| | Mac OS X Panther Hacks: 100 Industrial Strength Tips & ToolsLike the animal it's named for, Mac OS X Panther is beautiful, sleek, superbly efficient, dangerously alluring, and all muscle under the surface. Beneath its appealing interface, it's a hard-working machine. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh they're used... | | Windows Forensic Analysis DVD Toolkit, Second Edition"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis."
-Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer
"The Registry Analysis chapter alone is worth the price of the book."
-Troy Larson, Senior... |
|
|
Result Page: 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 |