Home | Amazing | Today | Tags | Publishers | Years | Search 
ASP.NET 4.0 in Practice
ASP.NET 4.0 in Practice

This has been a very long journey. We found that writing this book was a challenging task, a much harder one than we had anticipated, but there were also moments of joy and discovery along the way! The idea for the book first came to us 18 months ago, and many days and nights have come and gone between the first sentence we wrote and...

The Hoover Dam (Building America: Then and Now)
The Hoover Dam (Building America: Then and Now)
The time was the early 1930s, the president was Herbert Hoover, and the situation in the United States looked bleak. The stock market had crashed in 1929, and most Americans were hurt by the Great Depression, which left a majority of them jobless, homeless, and penniless. But in the West, a beacon of hope was in the...
Risk Management in Software Development Projects (Computer Weekly Professional)
Risk Management in Software Development Projects (Computer Weekly Professional)
A recent paper by the author, ‘Risk in Software Projects’ (in Management Services, October 2001), briefly referred to risk mitigation and its role in the risk management process. Publication of this paper prompted considerable discussion and requests for further information, particularly on software projects in...
HTML5 Games Most Wanted: Build the Best HTML5 Games
HTML5 Games Most Wanted: Build the Best HTML5 Games

HTML5 Games Most Wanted gathers the top HTML5 games developers and reveals the passion they all share for creating and coding great games. You'll learn programming tips, tricks, and optimization techniques alongside real-world code examples that you can use in your own projects. You won't just make...

Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Is “provisioning a web server in 5 minutes for $5” the most interesting thing about the cloud?

Those responsible for IT in their enterprise are quickly discovering that the cloud is a game-changing trend that offers a completely new methodology for service provision. The cloud not only lets you cut
...
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Smashing WordPress Themes: Making WordPress Beautiful (Smashing Magazine Book Series)
Smashing WordPress Themes: Making WordPress Beautiful (Smashing Magazine Book Series)

Smashing WordPress Themes is all about making your WordPress site look beautiful. But, the beautiful part is a very personal thing, because we all have different preferences. So in essence, my book isn’t on Web design, but rather about giving you, dear reader, the tools to build the kind of site that you want to create, using WordPress...

Standard Handbook of Petroleum and Natural Gas Engineering: Volume 1
Standard Handbook of Petroleum and Natural Gas Engineering: Volume 1

This petroleum and natural gas engineering two-volume handbook is written in the spirit of the classic handbooks of other engineering disciplines. The two volumes reflect the importance of the industry its engineers serve (i.e., Standard and Poor's shows that the fuels sector is the largest single entity in the gross domestic...

Cisco Firewalls (Networking Technology: Security)
Cisco Firewalls (Networking Technology: Security)

Networks today have outgrown exponentially both in size and complexity, becoming more multifaceted and increasingly challenging to secure. The blueprint of a core network requires a strong foundation, which can be simply provided with an integrated firewall architecture cemented at the core of the system. Today, the firewall has become...

Grid and Cloud Database Management
Grid and Cloud Database Management

Since the 1960s, database systems have been playing a relevant role in the information technology field. By the mid-1960s, several systems were also available for commercial purposes. Hierarchical and network database systems provided two different perspectives and data models to organize data collections. In 1970, E. Codd wrote a...

Applied WPF 4 in Context
Applied WPF 4 in Context

Windows Presentation Foundation (WPF) is a graphical computer platform built and distributed by Microsoft to create rich client applications for Windows systems. With WPF, you can build rich interfaces with animations and amazing graphical effects as easily as you can build minimalist and corporate user interfaces for line-of-business...

Introduction to Genetic Algorithms
Introduction to Genetic Algorithms

The origin of evolutionary algorithmswas an attempt tomimic some of the processes taking place in natural evolution. Although the details of biological evolution are not completely understood (even nowadays), there exist some points supported by strong experimental evidence:

• Evolution is a process operating over chromosomes...

Result Page: 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy