Home | Amazing | Today | Tags | Publishers | Years | Search 
Case-Based Reasoning Research and Development: Second International Conference on Case-Based Reasoning, ICCBR-97 Providence
Case-Based Reasoning Research and Development: Second International Conference on Case-Based Reasoning, ICCBR-97 Providence
In 1995, the first International Conference on Case-Based Reasoning (ICCBR) was held in Sesimbra, Portugal, as the start of a biennial series. ICCBR-97, the Second International Conference on Case-Based Reasoning, was held at Brown University in Providence, Rhode Island, on July 25-27, 1997. The goal of the conference was to achieve a vibrant...
Sams Teach Yourself Microsoft(R) Office 2007 All in One
Sams Teach Yourself Microsoft(R) Office 2007 All in One
Microsoft Corporation's Office products have an installed base of more than 25 million licensed users. More than 90% of the Fortune 500 companies use Microsoft Office. Microsoft completely redesigned the Office interface when it produced Office 2007. Microsoft's goal was to make the Office 2007 interface easier than ever to use, as well as more...
SharePoint 2007 and Office Development Expert Solutions (Programmer to Programmer)
SharePoint 2007 and Office Development Expert Solutions (Programmer to Programmer)
From generating Office documents programmatically to integrating document-based workflows with Line of Business applications or web sites, you'll see how to get the most out of your SharePoint environment. In order to do this, you'll examine how to integrate Microsoft's information worker products such as SQL Server 2005 and Office 2007 into...
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering,...
Managing Humans: Biting and Humorous Tales of a Software Engineering Manager
Managing Humans: Biting and Humorous Tales of a Software Engineering Manager
Managing Humans is a selection of the best essays from Michael Lopp's web site, Rands In Repose. Drawing on Lopp's management experiences at Apple, Netscape, Symantec, and Borland, this book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other. It is a place full...
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identity--a platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find...
Pro SharePoint Solution Development: Combining .NET, SharePoint and Office 2007 (Expert's Voice in Sharepoint)
Pro SharePoint Solution Development: Combining .NET, SharePoint and Office 2007 (Expert's Voice in Sharepoint)
Pro SharePoint Solution Development: Combining .NET, SharePoint, and Office 2007 takes a practical problem/solution approach to common business challenges. You'll not only encounter interesting code samples, but also see how to combine these examples with the Microsoft collaboration platform's services. The book's solutions focus on using...
Applied Mathematics for Database Professionals (Expert's Voice)
Applied Mathematics for Database Professionals (Expert's Voice)
Relational databases hold data, right? They indeed do, but to think of a database as nothing more than a container for data is to miss out on the profound power that underlies relational technology. A far more powerful way of thinking lies in relational technology's foundation in the mathematical disciplines of logic and set theory.

Databases...

The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data
The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data
Text mining tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. In addition to providing an in-depth examination of core text mining and link detection algorithms and operations, this book examines advanced...
Make Your Business Survive and Thrive!: 100+ Proven Marketing Methods to Help You Beat the Odds
Make Your Business Survive and Thrive!: 100+ Proven Marketing Methods to Help You Beat the Odds
Starting a new business is the easy part. Having it survive and then to thrive and grow is the biggest challenge every entrepreneur faces, especially the homebased and small business owner who usually has limited resources when launching a venture. Whether a business is based in one’s home or is a major corporation, certain basic principles...
Softswitch : Architecture for VoIP (Professional Telecom)
Softswitch : Architecture for VoIP (Professional Telecom)
SOFTSWITCH DISSECTED

SOFT OR HARD? Hardware switches can cost tens of millions and occupy a city block in real estate. Softswitches are a fraction of the cost and the size of a refrigerator. Bypassing big iron can also make for a more efficient development environment, potentially offering more...

Complete Wireless Design
Complete Wireless Design
Design an entire radio system from the ground up instead of relying on a simple plug-in selection of circuits to be modified. Avoid an arduous trek through theory and mathematical derivations. Cotter Sayre’s Complete Wireless Design is the handbook that fits your needs. It covers wireless hardware design more thoroughly than any...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy