|
|
|
|
Force.com Developer Certification Handbook (DEV401)
When migrating to the new wave of cloud-based applications, we now think about business logic, we think about automating processes, and we think about how we can make the systems better. Force.com is a cloud-based platform that is used to build and deploy enterprise applications on the cloud with minimum coding. Demand for Force.com experts... | | Starling Game Development Essentials
Develop and deploy isometric turn-based games using Starling
Overview
-
Create a cross-platform Starling Isometric game
-
Add enemy AI and multiplayer capability
-
Explore the complete source code for the Web and cross-platform game develpment
In... | | |
|
| | | | Information Brokering Across Heterogeneous Digital Data: A Metadata-based ApproachInformation intermediation is the foundation stone of some of the most successful Internet companies, and is perhaps second only to the Internet Infrastructure companies. On the heels of information integration and interoperability, this book on information brokering discusses the next step in information interoperability and integration. The... |
|
| | | | Building Data Science Teams
Starting in 2008, Jeff Hammerbacher (@hackingdata) and I sat down to share
our experiences building the data and analytics groups at Facebook and LinkedIn.
In many ways, that meeting was the start of data science as a distinct
professional specialization (see “What Makes a Data Scientist?”
on page 11 for the story on... |
|
Cisco Networking Essentials
Start a career in networking
Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts. Thinking of... | | The CISSP Prep Guide: Mastering the Ten Domains of Computer SecurityA one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination
The CISSP Prep Guide
From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can... | | |
|
|
Result Page: 76 75 74 73 72 71 70 69 68 67 66 |