Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites
Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites

Facebook, Twitter, and LinkedIn generate a tremendous amount of valuable social data, but how can you find out who's making connections with social media, what they’re talking about, or where they’re located? This concise and practical book shows you how to answer these questions and more. You'll learn how to...

Linux Network Servers (Craig Hunt Linux Library)
Linux Network Servers (Craig Hunt Linux Library)
Authoritative Answers to All Your Linux Network Server Questions—Specifically for Linux Administrators
Tap into Linux's impressive capabilities as a network server. Written by one of the world’s leading Linux system administration experts, Linux Network Servers teaches you,
...
Google Apps Script: Web Application Development Essentials
Google Apps Script: Web Application Development Essentials

Learn how to create dynamic web applications with Google Apps Script and take full advantage of your Google-hosted services. If you have basic coding skills and some JavaScript experience, this practical book shows you how Apps Script works, and provides step-by-step guidance for building applications you can use right away.

...
Practical Zendesk Administration
Practical Zendesk Administration
"Reading these chapters is like reading the advanced manual we never wrote when we designed the product. Stafford and Anton's ability to enlighten readers on how to use the product better and the reasons for the design decisions in Zendesk never ceases to impress us."
-Mikkel Svane, Founder and CEO at
...
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

JavaScript Application Cookbook
JavaScript Application Cookbook
Seasoned Java coders will find the JavaScript Application Cookbook compiled just for them. Written in the same vein as the old-style programmer "toolbox" titles, this book sheds the usual tutorial presentation and simply introduces a series of JavaScript applications you can use on your own sites.

The cookbook begins with...

Programming Python
Programming Python

If you've mastered Python's fundamentals, you're ready to start using it to get real work done. Programming Python will show you how, with in-depth tutorials on the language's primary application domains: system administration, GUIs, and the Web. You'll also explore how Python is used in databases,...

802.11n: A Survival Guide
802.11n: A Survival Guide
Communications is changing our life in many ways. Our society is increasingly dependent on wireless communications technologies and the applications they support. In the same way that we can’t understand how the folks who lived in 1800 managed without anesthesia, television, … (insert favorite must-have...
World Class IT: Why Businesses Succeed When IT Triumphs
World Class IT: Why Businesses Succeed When IT Triumphs

Prior to the 1970s, computer and electronics-based technology was hardly a pervasive part of our everyday lives. Automobiles were not yet computerized, fax machines were just taking off, and, significantly, the personal computer had yet to be popularized. Individuals who dreamed of a career in information technology departments were...

My Motorola Atrix 4G
My Motorola Atrix 4G

Step-by-step instructions with callouts to Motorola Atrix 4G photos so that you can see exactly what to do

 

Help when you run into Motorola Atrix 4G problems or limitations

 

...

Linux in a Nutshell
Linux in a Nutshell

Over the last few years, Linux has grown both as an operating system and a tool for personal and business use. Simultaneously becoming more user friendly and more powerful as a back-end system, Linux has achieved new plateaus: the newer filesystems have solidified, new commands and tools have appeared and become standard, and...

Security and Privacy for Microsoft Office 2010 Users
Security and Privacy for Microsoft Office 2010 Users
SECURITY AND PRIVACY issues with computers and computer networks are constantly in the news these days, and everyone seems to be concerned about them to some degree. Businesses everywhere are worried about having sensitive customer information such as credit card numbers or email addresses stolen,...
unlimited object storage image
Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy