Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro Business Applications with Silverlight 5 (Professional Apress)
Pro Business Applications with Silverlight 5 (Professional Apress)
Silverlight is a web-based platform from Microsoft that can be used to build Rich Internet Applications (RIAs). Of the many new possibilities it enables, one of its key focuses is as a platform for building business applications. Community support for the technology has been overwhelmingly positive, and Microsoft has gone on to use...
Management (with InfoTrac 1-Semester Printed Access Card)
Management (with InfoTrac 1-Semester Printed Access Card)

MANAGEMENT, 4th edition by Chuck Williams presents management theory and applications in an engaging narrative style that students will find both enjoyable and illuminating. Williams focuses on the most important management theories and concepts, enhancing and illustrating them with detailed examples and stories that pull students into the...

Introducing Data Science: Big Data, Machine Learning, and more, using Python tools
Introducing Data Science: Big Data, Machine Learning, and more, using Python tools

Summary

Introducing Data Science teaches you how to accomplish the fundamental tasks that occupy data scientists. Using the Python language and common Python libraries, you'll experience firsthand the challenges of dealing with data at scale and gain a solid foundation in data science.

...

Water and the Future of Humanity: Revisiting Water Security
Water and the Future of Humanity: Revisiting Water Security

This unique, engaging, and highly authoritative volume enlightens readers on changes needed in the way society accesses, provides, and uses water. It further shines a light on changes needed in the way we use food, energy, and other goods and services in relation to water, and offers projections and recommendations, up to 2050, that apply to...

Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

Java Development with Ant
Java Development with Ant
This book is about Ant, the award-winning Java build tool. Ant has become the centerpiece of so many projects’ build processes because it is easy to use, is platform independent, and addresses the needs of today’s projects to automate testing and deployment. From its beginnings as a helper application to compile Tomcat, Sun’s (now...
Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications
Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications
Critically acclaimed text for computer performance analysis—now in its second edition

The Second Edition of this now-classic text provides a current and thorough treatment of queueing systems, queueing networks, continuous and discrete-time Markov chains, and simulation. Thoroughly updated with...

Java Design Patterns: A Tutorial
Java Design Patterns: A Tutorial

Design patterns have become a staple of object-oriented design and programming by providing elegant, easy-to-reuse, and maintainable solutions to commonly encountered programming challenges. However, many busy Java programmers have yet to learn about design patterns and incorporate this powerful technology into their work.

...

The Courageous Follower: Standing Up to and for Our Leaders (2nd Edition)
The Courageous Follower: Standing Up to and for Our Leaders (2nd Edition)

This updated edition of a modern classic on followership provides the keys to creating an environment in which leaders are vigorously supported in pursuing the organization’s mission and courageously confronted when their actions threaten the organization’s well-being.

For every leader there are dozens of followers who work...

Cabling: The Complete Guide to Copper and Fiber-Optic Networking
Cabling: The Complete Guide to Copper and Fiber-Optic Networking

Two books in one! Complete coverage of data cabling and fiber optics makes this the most comprehensive cabling book on the market

With the growing demand for fiber optics in large-scale communications networks, network professionals need complete, up-to-the-minute information. The fourth edition of this popular guide provides you with...

Content Preparation Guidelines for the Web and Information Appliances: Cross-Cultural Comparisons (Human Factors and Ergonomics)
Content Preparation Guidelines for the Web and Information Appliances: Cross-Cultural Comparisons (Human Factors and Ergonomics)

Content preparation is an integral part of the usability equation: it answers the question of what information is needed for effective decision making. Once content preparation has been established, the question "how to present what" can be answered. Content Preparation Guidelines for the Web and Information Appliances:...

Practical Graph Analytics with Apache Giraph
Practical Graph Analytics with Apache Giraph

Practical Graph Analytics with Apache Giraph helps you build data mining and machine learning applications using the Apache Foundation’s Giraph framework for graph processing. This is the same framework as used by Facebook, Google, and other social media analytics operations to derive business value from vast amounts of...

unlimited object storage image
Result Page: 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy