Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OCA / OCP Java SE 8 Programmer Practice Tests
OCA / OCP Java SE 8 Programmer Practice Tests

Test your knowledge and prepare for the OCA/OCP exams

OCA/OCP Java SE 8 Programmer Practice Tests complements the Sybex OCA: Oracle Certified Associate Java SE 8 Programmer I Certification Study Guide and the OCP: Oracle Certified Professional Java SE 8 Programmer II Study Guide for exams 1Z0-808 and...

The Agile Enterprise: Building and Running Agile Organizations
The Agile Enterprise: Building and Running Agile Organizations

Discover how to implement and operate in an Agile manner at every level of your enterprise and at every point from idea to delivery. Learn how Agile-mature organizations adapt nimbly to microchanges in market conditions. Learn cutting-edge practices and concepts as you extend your implementation of Agile through the entire enterprise to meet...

Cisco IOS XR Fundamentals
Cisco IOS XR Fundamentals

Over the last several years, fiscal discipline has really dominated the industry. Both consumers and businesses expect far more from their communications providers than they did just a few years ago. Offering simple telephone dial tone and an Internet connection are not going to be enough for success. At the same time, however, service providers...

Schaum's Outline of Basic Circuit Analysis
Schaum's Outline of Basic Circuit Analysis

Master basic electricity with Schaum's­­the high-performance study guide. It will help you cut study time, hone problem-solving skills, and achieve your personal best on exams!

Students love Schaum's Outlines because they produce results. Each year, hundreds of thousands of students improve their test scores and...

Analysis of Algorithms : An Active Learning Approach
Analysis of Algorithms : An Active Learning Approach
The goal of Analysis of Algorithms is to raise awareness of the effect that algorithms have on the efficiency of a program and to develop the necessary skills to analyze general algorithms used in programs. The text presents the material with the expectation that it can be used with active and cooperative learning methodology, based on the premise...
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

Migrating Applications to IPv6
Migrating Applications to IPv6

How badly will IPv6 break your application? What do you need to consider to make your application “IPv6-ready”? What questions should you ask?

In the ideal world, your application should “just work” on IPv6, just as it does on IPv4. However, in the real world, application issues crop up. These could be...

Schaum's Outline of Electric Circuits
Schaum's Outline of Electric Circuits
Students love Schaum's Outlines because they produce results. Each year, hundreds of thousands of students improve their test scores and final grades with these indispensable study guides.

Get the edge on your classmates. Use Schaum's!

If you don't have a lot of time but want to excel in class, this book helps you:

...
Head First JavaScript
Head First JavaScript
So you're ready to make the leap from writing HTML and CSS web pages to creating dynamic web applications. You want to take your web skills to the next level. And you're finally ready to add "programmer" to the resume. It sounds like you're ready to learn the Web's hottest programming language: JavaScript. Head First JavaScript...
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information...

Cisco Router Firewall Security
Cisco Router Firewall Security

The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches...

Result Page: 48 47 46 45 44 43 42 41 40 39 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy