Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
UX Optimization: Combining Behavioral UX and Usability Testing Data to Optimize Websites
UX Optimization: Combining Behavioral UX and Usability Testing Data to Optimize Websites
Combine two typically separate sources of data?behavioral quantitative data and usability testing qualitative data?into a powerful single tool that helps improve your organization’s website by increasing conversion and ROI. The combination of the what is happening data of website activity, coupled with the...
Software Engineering for Absolute Beginners: Your Guide to Creating Software Products
Software Engineering for Absolute Beginners: Your Guide to Creating Software Products

Start programming from scratch, no experience required. This beginners’ guide to software engineering starts with a discussion of the different editors used to create software and covers setting up a Docker environment. Next, you will learn about repositories and version control along with its uses. Now that you are ready to...

Monitoring and Managing Microsoft Exchange 2000 Server (HP Technologies)
Monitoring and Managing Microsoft Exchange 2000 Server (HP Technologies)

Monitoring and Managing Microsoft Exchange 2000 Server focuses on what to do after Exchange has been deployed—how to design and implement the support infrastructure, how to monitor and manage messaging traffic, and how to avoid disaster through proactive planning and management. ...

Writing Secure Code, Second Edition
Writing Secure Code, Second Edition

If you design applications, or if you build, test, or document solutions, you need this book. If your applications are Web-based or Win32-based, you need this book. Finally, if you are currently learning or building Microsoft .NET Framework–based applications, you need this book. In short, if you are involved in building...

Joel on Software
Joel on Software

This is a selection of essays from the author's Web site, http://www.joelonsoftware.com. Joel Spolsky started the web log in March 2000 in order to offer his insights, based on years of experience, on how to improve the world of programming. His extraordinary writing skills, technical knowledge, and caustic wit have made him a programming guru....

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Instructional Engineering in Networked Environments (Tech Training Series)
Instructional Engineering in Networked Environments (Tech Training Series)
A Dynamic, Research-Based Approach to Knowledge Management

In this book, Gilbert Paquette–an internationally recognized expert in the field of technology-based training–offers IT professionals, trainers, and consultants a revolutionary method for going beyond simple information management. Instructional Engineering in Networked...

AdvancED ActionScript Components: Mastering the Flash Component Architecture
AdvancED ActionScript Components: Mastering the Flash Component Architecture
Macromedia's architecture is like a chest filled with precious jewels, and this book is quite simply the key to open it! One of the most important tools provided with Flash is the Macromedia Component Architecture: a framework of components written in ActionScript 2, based on established design patterns, that provides a wealth of functionality you...
Chemical Process Safety: Learning from Case Histories
Chemical Process Safety: Learning from Case Histories
"Given his extensive background in an industrial setting as a team leader at the PPG Chlor-Alkali Plant in Louisiana and the safety course that he taught for AIChE with the well-known safety expert Trevor Kletz, the quantity of information of a practical nature contained in this book is not surprising."
 - Gary Bennett,
...
Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Object Oriented Perl: A Comprehensive Guide to Concepts and Programming Techniques
Object Oriented Perl: A Comprehensive Guide to Concepts and Programming Techniques
Perl has always been a powerful and popular programming language, but with its new object capabilities, it can do even more. Written for anyone with a little Perl experience, Damian Conway's Object Oriented Perl provides an invaluable guide to virtually every aspect of object-oriented programming in Perl.

The most notable thing about...

Physics Modeling for Game Programmers
Physics Modeling for Game Programmers
Programmers who want to include 3D math and physics in a game have to wade through physics textbooks and dreary tomes on linear algebra and group theory, only to find that the material is too abstract to be used directly in their games. This book gives readers the skills they want and need to incorporate real physics into their games. As they work...
unlimited object storage image
Result Page: 805 804 803 802 801 800 799 798 797 796 795 794 793 792 791 790 789 788 787 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy