Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Sentinel Lymph Node Concept
The Sentinel Lymph Node Concept
Br J Surg (2005) 92 (4) p. 495: "This is a book not only for surgeons but also for other specialists for whom regional tumour growth has implications for treatment. The whole spectrum...is fully covered in 33 chapters. I can wholeheartedly recommend this book to those whose practice requires the diagnosis and treatment of locoregional...
Cisco IOS XR Fundamentals
Cisco IOS XR Fundamentals

Over the last several years, fiscal discipline has really dominated the industry. Both consumers and businesses expect far more from their communications providers than they did just a few years ago. Offering simple telephone dial tone and an Internet connection are not going to be enough for success. At the same time, however, service providers...

Improving Surveys with Paradata: Analytic Uses of Process Information
Improving Surveys with Paradata: Analytic Uses of Process Information

Explore the practices and cutting-edge research on the new and exciting topic of paradata

Paradata are measurements related to the process of collecting survey data.

Improving Surveys with Paradata: Analytic Uses of Process Information is the most accessible and comprehensive contribution to this up-and-coming  area...

Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services

In these days of shortened fiscal horizons and contracted time-to-market schedules, traditional approaches to capacity planning are often seen by management as tending to inflate their production schedules. Rather than giving up in the face of this kind of relentless pressure to get things done faster, Guerrilla Capacity Planning facilitates...

Location and Personalisation: Delivering Online and Mobility Services (BT Communications Technology)
Location and Personalisation: Delivering Online and Mobility Services (BT Communications Technology)
The world is charging towards the new network technologies of broadband and 3G and new application technologies face the challenge of where they can be used. This book takes a pragmatic look at two particular application technologies - location and personalisation - and presents an understanding of the technical and business impact of these...
Professional SharePoint 2007 Development (Programmer to Programmer)
Professional SharePoint 2007 Development (Programmer to Programmer)
If you're a .NET or Microsoft Office developer, this book gives you the tools to utilize the entire SharePoint platform. It offers practical insights that will help you take advantage of this integrated suite of server capabilities along with specific examples of how to implement classes of solutions on top of the platform. You'll be able to apply...
Professional Microsoft Office SharePoint Designer 2007 (Wrox Programmer to Programmer)
Professional Microsoft Office SharePoint Designer 2007 (Wrox Programmer to Programmer)
With Professional Microsoft Office SharePoint Designer 2007, you can master all aspects of using Share Point Designer in an Enterprise environment to enhance Microsoft SharePoint Products and Technologies. Review key integration points, how to use CSS editing tools to create and modify SharePoint themes, how to supplement SharePoint...
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Effective Enterprise Java
Effective Enterprise Java

If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to:

  • Use in-process or local storage to avoid the network

    ...
Succeeding with Open Source
Succeeding with Open Source
Much like Odysseus—who had to negotiate perils between Scylla and Charybdis—IT managers face daunting challenges. On one side, there is relentless pressure to cut costs. On the other lies an unending demand for innovative solutions. However, unlike Odysseus, IT managers must not simply avoid either fate: Instead, they must fulfill both...
Data Architecture: From Zen to Reality
Data Architecture: From Zen to Reality

First, note that I have used Zen in the title of this book. I have been asked many times why I used such an esoteric term. After all, what is the meaning of Zen? To clarify the meaning of Zen, we must examine the philosophical environment that gave rise to Zen: Indian and Chinese philosophies. In India, Buddhism arose out of a Hindu...

Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Result Page: 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy