Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobilizing Generation 2.0: A Practical Guide to Using Web2.0 Technologies to Recruit, Organize and Engage Youth
Mobilizing Generation 2.0: A Practical Guide to Using Web2.0 Technologies to Recruit, Organize and Engage Youth

Mobilizing Generation 2.0

Mobilizing Generation 2.0 is a practical and immediately useful guide for nonprofits, political campaigns, organizers, and individuals who want to better understand how to use Web 2.0 technologies. In easy-to-understand terms, this accessible book describes how readers can leverage new media (blogs,...

On Top of the Cloud: How CIOs Leverage New Technologies to Drive Change and Build Value Across the Enterprise
On Top of the Cloud: How CIOs Leverage New Technologies to Drive Change and Build Value Across the Enterprise

Praise for On Top of the Cloud

"21st-century CIOs have a dual responsibility: driving down costs and creating new business value. Managing this seeming dichotomy is the domain of top business executives everywhere, and CIOs everywhere are learning to step it up. The original research contained in Hunter's book...

Developing IP-Based Services: Solutions for Service Providers and Vendors (The Morgan Kaufmann Series in Networking)
Developing IP-Based Services: Solutions for Service Providers and Vendors (The Morgan Kaufmann Series in Networking)

Offering new services is a great way for your organization to drive traffic and boost revenue, and what better foundation for these services than IP? This much is a given. The difficulty is uniting business and technical perspectives in a cohesive development and deployment process.

Meeting this challenge is the focus of...

Eclipse Plug-ins (3rd Edition) (Eclipse Series)
Eclipse Plug-ins (3rd Edition) (Eclipse Series)
Build commercial-grade extensions to Eclipse and WebSphere Studio Workbench

This is the first definitive, start-to-finish guide to building commercial-quality extensions for both Eclipse and IBM's WebSphere Studio Workbench. Leading Eclipse developers Eric Clayberg and Dan Rubel don't merely introduce the basics: they show how...

Ad Hoc Mobile Wireless Networks: Protocols and Systems
Ad Hoc Mobile Wireless Networks: Protocols and Systems

The authoritative guide to the state of the art in ad hoc wireless networking.

  • Reflects the field's latest breakthroughs

  • Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much...

Microsoft BizTalk Server 2010 Unleashed
Microsoft BizTalk Server 2010 Unleashed

Microsoft BizTalk Server 2010 Unleashed is the 100% new, 100% practical developer’s guide to Microsoft’s most powerful version of BizTalk Server. Written by an expert team of Microsoft insiders and BizTalk MVPs, it reflects unsurpassed experience with all phases of BizTalk enterprise solutions...

Open Source for the Enterprise: Managing Risks Reaping Rewards
Open Source for the Enterprise: Managing Risks Reaping Rewards

Open source software is changing the world of Information Technology. But making it work for your company is far more complicated than simply installing a copy of Linux. If you are serious about using open source to cut costs, accelerate development, and reduce vendor lock-in, you must institutionalize skills and create new ways...

Integrating Service Level Agreements: Optimizing Your OSS for SLA Delivery
Integrating Service Level Agreements: Optimizing Your OSS for SLA Delivery
Uncover a revolutionary approach to SLAs that will help you gain a competitive advantage in the field

The use of Service Level Agreements (SLAs) will soon become the prevailing business model for delivering a large number of products and services. SLAs offer service providers the ability to distinguish themselves from the competition in...

SSL & TLS Essentials: Securing the Web
SSL & TLS Essentials: Securing the Web
The Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now—for the first time the details of these critical security...
Jump Start Node.js
Jump Start Node.js
One of the difficulties I had when trying to learn Node.js was how to get started. The references that I found either dealed with quasi-academic topics such as datagrams and event emitters, or else myopically focused on a topic without regard for the big picture. This book takes you through the complete process of...
SOA Security
SOA Security
SOA is one of the latest technologies enterprises are using to tame their software costs - in development, deployment, and management. SOA makes integration easy, helping enterprises not only better utilize their existing investments in applications and infrastructure, but also open up new business opportunities. However, one of the big stumbling...
UWB Communication Systems: A Comprehensive Overview (EURASIP Book Series on Signal Processing and Communications)
UWB Communication Systems: A Comprehensive Overview (EURASIP Book Series on Signal Processing and Communications)
Ultrawideband (UWB) communication systems offer an unprecedented opportunity to impact the future communication world. The enormous available bandwidth, the wide scope of the data rate / range trade-off, as well as the potential for very low-cost operation leading to pervasive usage, all present a unique opportunity for UWB systems to impact the...
unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy