Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Google Analytics
Google Analytics

Do you know what people do when they visit your website or web app? Or how much the site contributes to your bottom line? Google Analytics keeps track and makes it easy for you to learn precisely what's happening. This hands-on guide shows you how to get the most out of this free and powerful tool -- whether you're new to...

Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Python and AWS Cookbook
Python and AWS Cookbook

If you intend to use Amazon Web Services (AWS) for remote computing and storage, Python is an ideal programming language for developing applications and controlling your cloud-based infrastructure. This cookbook gets you started with more than two dozen recipes for using Python with AWS, based on the author’s boto library.

...
Advanced Practice Nursing: Emphasizing Common Roles
Advanced Practice Nursing: Emphasizing Common Roles

Prepare your graduate students to take leadership roles inthe future of Advance Practice Nursing. The author address the major issuesfacing Advanced Practice Nursing today from a collective perspective thatbegins with its historical roots and progresses to contemporary concerns andtrends. This approach enables APNs to understanding the...

Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code (Expert's Voice)
Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code (Expert's Voice)
IT HAS BEEN DOCUMENTED that the maintenance phase of the typical software project’s life cycle accounts for over 60 percent of the total cost incurred. For all the pomp and circumstance heaped upon the design phase, once the first release has been deployed, most of the resources will be spent on fixing bugs, adding new features, and...
Oracle Performance Tuning and Optimization
Oracle Performance Tuning and Optimization

Database management software and the manipulation of data has evolved to where it touches every aspect of our lives. A day doesn’t go by in which we don’t access a database. Whether we are withdrawing money from an ATM machine, opening a checking account, or purchasing groceries, every aspect of our lives is affected by...

System Analysis, Design, and Development : Concepts, Principles, and Practices
System Analysis, Design, and Development : Concepts, Principles, and Practices
Learn to develop systems that meet customer needs and organizational objectives

Successful system development requires formulation and implementation of a sound technical strategy that accurately translates the user's operational needs into a physical solution to comply with their specifications and contract requirements. System Analysis,...

Cryptography for Developers
Cryptography for Developers
The only guide for software developers who must learn and implement cryptography safely and cost effectively.

The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent
...
Machinima For Dummies (Computer/Tech)
Machinima For Dummies (Computer/Tech)

Create high-quality animations at little to no cost!

The fun and easy way® to film in a virtual world and get your movie noticed

Want to master Machinima? This friendly, hands-on guide is packed with savvy techniques for movie-making in Machinima's most popular creation...

Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
The loss of sensitive data continues to be a signifi cant concern for both organizations as well as individuals whose information may be at risk of a breach. Organizations that experience a data breach can suffer reputational damage, loss of customer and constituent confi dence, legal and regulatory scrutiny, and the direct costs of managing an...
Robust Industrial Control Systems: Optimal Design Approach for Polynomial Systems
Robust Industrial Control Systems: Optimal Design Approach for Polynomial Systems
Robust Industrial Control Systems: Optimal Design Approach for Polynomial Systems presents a comprehensive introduction to the use of frequency domain and polynomial system design techniques for a range of industrial control and signal processing applications.  The solution of stochastic and robust optimal control problems is...
The Role of the Chemist in Automotive Design
The Role of the Chemist in Automotive Design
Today’s engineering applications require material knowledge above and beyond that of most mechanical engineers. Polymers are being increasingly used to help make vehicles lighter, more cost effective, and more environmentally friendly. New technologies such as engineering polymers, polymer films in fuel cells, microcellular foams, and...
unlimited object storage image
Result Page: 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy