Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SAP Business ONE Implementation
SAP Business ONE Implementation
SAP Business ONE brings the power of the SAP ERP platform to small and mid-size companies. It offers fast-growing companies the same ERP capabilities used in world-wide conglomerates and major corporations. SAP Business ONE is powerful, and to fully harness it takes careful planning.

This book will provide you with a guide to install and...

Autonomics Development: A Domain-Specific Aspect Language Approach (Autonomic Systems)
Autonomics Development: A Domain-Specific Aspect Language Approach (Autonomic Systems)

Distributed applications are difficult to write as programmers need to adhere to specific distributed systems programming conventions and frameworks, which makes distributed systems development complex and error prone and ties the resultant application to the distributed system because the application's code is tangled with the...

GNOME 3 Application Development Beginner's Guide
GNOME 3 Application Development Beginner's Guide

Step-by-step practical guide to get to grips with GNOME application development

Overview

  • Full of easy to follow tutorials with ready-to-run code.
  • Covers most of the subsystems in the GNOME 3 platform stack, from low to high level.
  • Adapts common good development practices with...
Strategies for Growth in SMEs: The Role of Information and Information Sytems
Strategies for Growth in SMEs: The Role of Information and Information Sytems
Over the last decade, the rise in the importance of information and
knowledge for business activity has been phenomenal. Globalization
has become a reality and competition is more dynamic (Porter, 1998) as
firms source materials and manufacture goods in many locations, while
innovation is vital for future business growth.
...
Penetration Tester's Open Source Toolkit
Penetration Tester's Open Source Toolkit
This is the first fully integrated Penetration Testing book and bootable Linux CD containing the Auditor Security Collection which includes over 300 of the most effective and commonly used open source attack and penetration testing tools. This powerful tool kit and authoritative reference is written by the security industry's foremost...
Lotus Notes and Domino 6 Programming Bible
Lotus Notes and Domino 6 Programming Bible
"This unmatched book is a must-have reference for Notes and Domino developers."
– John Hawkins, Editorial Director,
Lotus Advisor Magazine & Conference

If Lotus Notes and Domino 6 can do it, you can do it too...

Whether you’re an architect, developer, or administrator, this guidebook...

The Drinking Water Handbook, Second Edition
The Drinking Water Handbook, Second Edition

When you open the tap to fill your glass with drinking water, you expect the water to be of good quality. But is the water from your tap really safe? The second edition of an industry-wide bestseller, The Drinking Water Handbook explains the many processes employed to make water safe to drink. Starting at the source, it...

concrete5 Beginner's Guide - Second Edition
concrete5 Beginner's Guide - Second Edition

concrete5 is a superb content management system and this book will show you how to get going with it. From basic installation through to advanced techniques of customization, it's the perfect primer for web developers.

Overview

  • Create your own theme to customize the look of your site.
  • ...
Electrical Energy Efficiency: Technologies and Applications
Electrical Energy Efficiency: Technologies and Applications

The improvement of electrical energy efficiency is fast becomingone of the most essential areas of sustainability development,backed by political initiatives to control and reduce energydemand.

Now a major topic in industry and the electrical engineeringresearch community, engineers have started to focus on analysis,diagnosis and...

Trends in Functional Programming: Volume 5
Trends in Functional Programming: Volume 5
Covers all aspects of functional programming, both theoretical and practical, to provide a coherent overview of research's most recent developments. This book features: language design, proof and transformation, semantics and models, implementation, applications, type systems, parallelismand distribution, performance modelling and profiling,...
Oracle 10g RAC Grid, Services & Clustering
Oracle 10g RAC Grid, Services & Clustering
Oracle RAC and grid technology is transforming the economics of high-end database computing and is a technology that all Oracle professionals should become familiar with. Murali is one of the worlds foremost independent experts on Oracle RAC technology and his book contains everything you need to become proficient in both the theory and practice...
Fedora Core 7 & Red Hat Enterprise Linux: The Complete Reference
Fedora Core 7 & Red Hat Enterprise Linux: The Complete Reference
The Red Hat Linux and Fedora distributions have become one of the major Linux distributions, bringing to the PC all the power and flexibility of a Unix workstation as well as a complete set of Internet applications and a fully functional desktop interface. This book is designed not only to be a complete reference on Linux, but also to provide clear...
unlimited object storage image
Result Page: 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy