Home | Amazing | Today | Tags | Publishers | Years | Search 
What Is HTML5?
What Is HTML5?

HTML5: Everyone’s using it, nobody knows what it is. I realize that sounds more like a line out of an existential movie — maybe Waiting for Godot or a screenplay by Sartre — than a statement about HTML5. But it’s really...

CIOs at Work
CIOs at Work

In CIOs at Work, noted author Ed Yourdon interviews many of the world's most influential chief information officers. You will gain insights from the first CIO of the USA, take a peek into the future with the CIO at Google, learn the unique role IT plays in testing Microsoft applications, and much more.

...

The Information Diet: A Case for Conscious Consumption
The Information Diet: A Case for Conscious Consumption

The modern human animal spends upwards of 11 hours out of every 24 in a state of constant consumption. Not eating, but gorging on information ceaselessly spewed from the screens and speakers we hold dear. Just as we have grown morbidly obese on sugar, fat, and flour—so, too, have we become gluttons for texts, instant...

The New How [Paperback]: Creating Business Solutions Through Collaborative Strategy
The New How [Paperback]: Creating Business Solutions Through Collaborative Strategy

What people are saying about The New How
 

"How are you going to get rid of your Air Sandwich if you don't even know what it is? Provocative and practical at the same time."
--Seth Godin, author of Linchpin

"The New How is informative and...

Accessibility for Everybody: Understanding the Section 508 Accessibility Requirements
Accessibility for Everybody: Understanding the Section 508 Accessibility Requirements

In today's rapidly changing technological world, it is increasingly important that web and desktop applications be accessible to everyone, including those of us with special needs. However, the legal requirements for accessibility are often convoluted and diffucult to understand, making it impossible for most developers to comply with the...

Java Security (Java Series)
Java Security (Java Series)

Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with...

Identity and Data Security for Web Development: Best Practices
Identity and Data Security for Web Development: Best Practices

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...

Getting Started with Amazon Redshift
Getting Started with Amazon Redshift

Start by learning the fundamentals and then progress to creating and managing your own Redshift cluster. This guide walks you step-by-step through the world of big data, cloud computing, and scalable data warehousing.

Overview

  • Step-by-step instructions to create and manage your Redshift cluster
  • ...
Yearbook of Intensive Care and Emergency Medicine 2006
Yearbook of Intensive Care and Emergency Medicine 2006

The Yearbook compiles the most recent developments in experimental and clinical research and practice in one comprehensive reference book. The chapters are written by well recognized experts in the field of intensive care and emergency medicine. It is addressed to everyone involved in internal medicine, anesthesia, surgery, pediatrics,...

Understand Data Mining
Understand Data Mining

Data mining is definitely not a piece of cake. There are those who spend years in the specialization of this particular field in order to operate businesses smoothly. Are you looking for a data mining course? You too, have the ability and the means to learn all the tricks that go into data mining. This book has been specifically written for...

The Handbook of Traditional and Alternative Investment Vehicles: Investment Characteristics and Strategies
The Handbook of Traditional and Alternative Investment Vehicles: Investment Characteristics and Strategies

A comprehensive volume that covers a complete array of traditional and alternative investment vehicles

This practical guide provides a comprehensive overview of traditional and alternative investment vehicles for professional and individual investors hoping to gain a deeper understanding of the benefits and pitfalls of using...

Adaptive Digital Filters
Adaptive Digital Filters

“Adaptive Digital Filters” presents an important discipline applied to the domain of speech processing. The book first makes the reader acquainted with the basic terms of filtering and adaptive filtering, before introducing the field of advanced modern algorithms, some of which are contributed by the authors themselves. Working in...

Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy