Home | Amazing | Today | Tags | Publishers | Years | Search 
Recommender Systems for the Social Web (Intelligent Systems Reference Library, Vol. 32)
Recommender Systems for the Social Web (Intelligent Systems Reference Library, Vol. 32)
The emergence and deployment of new digital communication technologies (3G mobile networks, digital television, xDSL, home automation networks, etc.) has led to a gradual increase in speed while a steady decline in prices at Internet connections. Moreover, since much longer ago, the continuing advances in electronic technology...
SharePoint 2010 Enterprise Architect's Guidebook
SharePoint 2010 Enterprise Architect's Guidebook
MICROSOFT COLLABORATION and companion development technologies have really come a long way over the past 20 years. Over this time, many different technologies have come and gone in the blink of an eye. Others have built up momentum, improving with each new version, providing valuable new features to meet the ever-increasing digital...
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It briefly describes the history of the cyberforensics field and places the subsequent chapters into context. The last section of the introduction, Expert Explanations, describes the format of the following sections and also how the sections complement...
SOA Governance in Action: REST and WS-* Architectures
SOA Governance in Action: REST and WS-* Architectures
A few years ago, I wrote a book with a colleague about open source ESBs (Enterprise Service Buses), Open Source ESBs in Action (Manning, 2008). In that book we wrote about using open source tools to integrate applications and expose legacy systems as services. In the years that followed, ESBs were seen as one of the...
Microsoft SharePoint 2010 Business Application Blueprints
Microsoft SharePoint 2010 Business Application Blueprints
This book will dive into a diverse set of real-world scenarios to deliver sample business solutions that can serve as the foundation for your own solutions. It draws from the author's extensive experience with SharePoint to leverage the platform's underlying services to provide solutions that can support social...
DB2 Developer's Guide: A Solutions-Oriented Approach to Learning the Foundation and Capabilities of DB2 for z/OS (6th Edition)
DB2 Developer's Guide: A Solutions-Oriented Approach to Learning the Foundation and Capabilities of DB2 for z/OS (6th Edition)

DB2 Developer's Guide is the field's #1 go-to source for on-the-job information on programming and administering DB2 on IBM z/OS mainframes. Now, three-time IBM Information Champion Craig S. Mullins has thoroughly updated this classic for DB2 v9 and v10. Mullins fully covers new DB2 innovations including temporal database support;...

Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs
Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs
The evolution of managing Cloud Computing Services in principles and practices provided by the best practices IT Service Management framework provides the more holistic guidance needed for an industry that continues to mature and develop at a rapid pace.

Many organizations and individuals who had previously struggled
...
Agile Oracle Application Express
Agile Oracle Application Express

Before Oracle Application Express (APEX) can be discussed in the light of Agile software development, the stage must be set by defining, for the purposes of this book, what is meant by Agile software development.

This chapter introduces you to the core principles of Agile software development. The core principles were...

Combinatorial Optimization: Methods and Applications: Volume 31 NATO Science for Peace and Security Series - D: Information and Communication Security
Combinatorial Optimization: Methods and Applications: Volume 31 NATO Science for Peace and Security Series - D: Information and Communication Security

This book is a collection of six articles arising from the meeting of the NATO Advanced Study Institute (ASI) ''Combinatorial Optimization: Methods and Applications,'' which was held at the University of Montreal in June 2006. This ASI consisted of seven series of five one-hour lectures and one series of four one-hour...

Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications
Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications

This publication offers and investigates efficient Monte Carlo simulation methods in order to realize a Bayesian approach to approximate learning of Bayesian networks from both complete and incomplete data. For large amounts of incomplete data when Monte Carlo methods are inefficient, approximations are implemented, such that learning remains...

Coding Freedom: The Ethics and Aesthetics of Hacking
Coding Freedom: The Ethics and Aesthetics of Hacking

Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source...

Managing Business Risk: A Practical Guide to Protecting Your Business
Managing Business Risk: A Practical Guide to Protecting Your Business
The balance between risk and reward is the very essence of business: you have to take risks in order to generate returns and, generally speaking, higher returns involve greater risks. However, there is a difference between risks taken as a result of careful judgement and those taken unwittingly.

In a world of
...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy