Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Architecture: From Zen to Reality
Data Architecture: From Zen to Reality

First, note that I have used Zen in the title of this book. I have been asked many times why I used such an esoteric term. After all, what is the meaning of Zen? To clarify the meaning of Zen, we must examine the philosophical environment that gave rise to Zen: Indian and Chinese philosophies. In India, Buddhism arose out of a Hindu...

Perfect Passwords: Selection, Protection, Authentication
Perfect Passwords: Selection, Protection, Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According
...
Developing Effective Engineering Leadership (IEE Management of Technology Series, 21)
Developing Effective Engineering Leadership (IEE Management of Technology Series, 21)

Engineering companies and other organizations face many serious challenges in the 21st Century. One that is now becoming widely recognized is the loss of corporate knowledge through staff turnover, whether it is natural or forced through downsizing or de-layering. The company’s store of knowledge and expertise is an asset built up through...

Liabilities, Liquidity, and Cash Management: Balancing Financial Risks
Liabilities, Liquidity, and Cash Management: Balancing Financial Risks
"This book provides a very helpful and informative insight into an aspect of finance that has become quite intricate and complex but is nevertheless very fascinating."--Dr. Henry Kaufman, President, Henry Kaufman & Company, Inc.

Strategies and advice on balancing financial risk for leveraged companies

In...

Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

Developing Bots with Microsoft Bots Framework: Create Intelligent Bots using MS Bot Framework and Azure Cognitive Services
Developing Bots with Microsoft Bots Framework: Create Intelligent Bots using MS Bot Framework and Azure Cognitive Services
Develop Intelligent Bots using Microsoft Bot framework (C# and Node.js), Visual Studio Enterprise & Code, Microsoft Azure and Cognitive Services. This book shows you how to develop great Bots, publish to Azure and register with Bot portal so that customers can connect and communicate using famous communication channels...
Lost Sex: The Evolutionary Biology of Parthenogenesis
Lost Sex: The Evolutionary Biology of Parthenogenesis

Sex is the queen of problems in evolutionary biology. Generations of researchers have investigated one of the last remaining evolutionary paradoxes: why sex exists at all. Given that sexual reproduction is costly from an evolutionary point of view, one could wonder why not all animals and plants reproduce asexually. Dozens of contemporary...

Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

Evolution: The Human Story
Evolution: The Human Story

How did we develop from simple animals inhabiting small pockets of forest in Africa to the dominant species on Earth? Traveling back almost eight million years to our earliest primate relatives, Evolution: The Human Story charts the development of our species from tree-dwelling primates to modern humans.

Investigating each...

Python Deep Learning Projects: 9 projects demystifying neural network and deep learning models for building intelligent systems
Python Deep Learning Projects: 9 projects demystifying neural network and deep learning models for building intelligent systems

Insightful projects to master deep learning and neural network architectures using Python and Keras

Key Features

  • Explore deep learning across computer vision, natural language processing (NLP), and image processing
  • Discover best practices for the training of deep neural...
Professional Visual Studio Extensibility
Professional Visual Studio Extensibility
Professional Visual Studio Extensibility

Are you ready to extend the capabilities of Visual Studio to become more efficient and productive? Whether you want to integrate optimized builds, enhanced programming tools, or other rapid application development features, this unique resource shows you how to develop customized...

Professional K2 blackpearl (Wrox Programmer to Programmer)
Professional K2 blackpearl (Wrox Programmer to Programmer)
Built on Microsoft technologies including Microsoft Office SharePoint Server, SQL Server, Microsoft Office 2007, and Visual Studio 2005 and 2008, the latest K2 [blackpearl] release provides you with mature workflow management systems that can automate processes or pull together people, services, and systems. You’ll get an introduction to...
unlimited object storage image
Result Page: 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy