Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Databases and Information Systems VI: Selected Papers from the Ninth International Baltic Conference, DB&IS 2010 - Volume 224 Frontiers in Artificial Intelligence and Applications
Databases and Information Systems VI: Selected Papers from the Ninth International Baltic Conference, DB&IS 2010 - Volume 224 Frontiers in Artificial Intelligence and Applications
This volume presents papers from the Ninth International Baltic Conference on Databases and Information Systems (Baltic DB&IS 2010) which took place in Riga, Latvia, in July 2010. Since this successful biennial series began in 1994, the Baltic DB&IS conferences have become an international forum of high scientific criteria for...
Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Computer Age Statistical Inference: Algorithms, Evidence, and Data Science (Institute of Mathematical Statistics Monographs)
Computer Age Statistical Inference: Algorithms, Evidence, and Data Science (Institute of Mathematical Statistics Monographs)
The twenty-first century has seen a breathtaking expansion of statistical methodology, both in scope and in influence. “Big data,” “data science,” and “machine learning” have become familiar terms in the news, as statistical methods are brought to bear upon the enormous data sets of modern science...
CEH v9: Certified Ethical Hacker Version 9 Practice Tests
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

Master CEH v9 and identify your weak spots

CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain...

The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling
The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling

Updated new edition of Ralph Kimball's groundbreaking book on dimensional modeling for data warehousing and business intelligence!

The first edition of Ralph Kimball's The Data Warehouse Toolkit introduced the industry to dimensional modeling, and now his books are considered the most authoritative...

MySQL/PHP Database Applications
MySQL/PHP Database Applications
MySQL/PHP Database Applications Affordable Open Source Solutions to E-Commerce Challenges In this unique guide, two Web development gurus show you how to harness the open source power of MySQL and PHP — and create high-performance Web database applications that won't break the bank. Using plenty of ready-to-run code and seven concrete...
Amazing Java: Learn Java Quickly!
Amazing Java: Learn Java Quickly!


Do you know Java is being used worldwide? These days it is difficult to find a platform not running on Java. Their uses begin from commercial e-commerce website to Android apps, from desktop applications to games, from financial applications to scientific applications, from J2ME applications to open source library
...

ReactJS by Example- Building Modern Web Applications with React
ReactJS by Example- Building Modern Web Applications with React

Key Features

  • Create pragmatic real-world applications while learning React and its modern developer tools
  • Build sustainable user interfaces by transforming data into components of UI
  • Learn how to generate reusable ReactJS components effectively

Book Description

...

Successful Proposal Strategies For Small Businesses
Successful Proposal Strategies For Small Businesses
Successful Proposal Strategies for Small Businesses: Using Knowledge
Management to Win Government, Private-Sector, and International
Contracts, Fourth Edition, is designed to provide entrepreneurs, as
well as beginner and experienced proposal managers, capture managers,
proposal writers, proposal specialists and coordinators,
...
Professional ASP.NET MVC 1.0 (Wrox Programmer to Programmer)
Professional ASP.NET MVC 1.0 (Wrox Programmer to Programmer)
The ASP.NET MVC framework is designed from the ground up with certain core principles in mind-extensibility, testability, and separation of concerns. The framework adds various conventions into the mix to help drive developers into the "Pit of Success," providing for a streamlined development experience that fits the way the web works....
Bitcoin for the Befuddled
Bitcoin for the Befuddled

Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin—the game-changing digital currency used by millions worldwide.

But Bitcoin isn't just another way to buy stuff. It's an anonymous, revolutionary, cryptographically secure currency that functions...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Result Page: 67 66 65 64 63 62 61 60 59 58 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy