Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Modern Web Applications Using Angular
Building Modern Web Applications Using Angular

Key Features

  • Learn about the core building blocks of Angular
  • Build and architect high performance web applications
  • Implement the latest JavaScript concepts in ECMAScript 2015, ECMAScript 2016, and TypeScript
  • Leverage the latest Angular features to get the most out of your web...
The Mental Health Professional and the New Technologies: A Handbook for Practice Today
The Mental Health Professional and the New Technologies: A Handbook for Practice Today
Technology, used for both informational and telecommunication purposes, is becoming one of the most important factors in the future of health care delivery. One can see the oncoming change simply by surfing the Internet and looking at the proliferation of health-related Web sites. The 7 million Web sites uncovered by the Alta Vista search engine...
The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
The Executive Guide to E-mail Correspondence: Including Model Letters for Every Situation
Sit down at the keyboard and cinch that deal! Press the send button and get the account!

Writing skills are more important than ever in determining business success. They can make the difference between climbing the corporate ladder and getting stuck on a low rung. An e-mail that's clear, concise, and targeted will get more than just a...

The Mythical Man-Month: Essays on Software Engineering, 20th  Anniversary Edition
The Mythical Man-Month: Essays on Software Engineering, 20th Anniversary Edition
The classic book on the human elements of software engineering. Software tools and development environments may have changed in the 21 years since the first edition of this book, but the peculiarly nonlinear economies of scale in collaborative work and the nature of individuals and groups has not changed an epsilon. If you write code or...
Modeling of Curves and Surfaces with MATLAB®
Modeling of Curves and Surfaces with MATLAB®

This text on geometry modeling is devoted to a number of central geometrical topics— graphs of functions, transformations, (non-)Euclidean geometries, curves and surfaces— and presents some elementary methods for analytical modeling and visualization of them.

In 1872 F. Klein proposed his Erlangen Programme in...

Differential Geometry: Bundles, Connections, Metrics and Curvature (Oxford Graduate Texts in Mathematics, Vol. 23)
Differential Geometry: Bundles, Connections, Metrics and Curvature (Oxford Graduate Texts in Mathematics, Vol. 23)

Bundles, connections, metrics and curvature are the 'lingua franca' of modern differential geometry and theoretical physics. This book will supply a graduate student in mathematics or theoretical physics with the fundamentals of these objects.

Many of the tools used in differential topology are introduced and the
...

Enhancing CAD Drawings with Photoshop
Enhancing CAD Drawings with Photoshop
"If you're an architect looking to get the most out of Photoshop, look no further! Enhancing CAD Drawings with Photoshop is a killer book."
George Omura, Author, Mastering AutoCAD 2005 and AutoCAD LT 2005

Bring Your CAD Drawings to Life Using Artistic Photoshop
...
XML Schema Essentials
XML Schema Essentials
The definitive how-to guide that will get you quickly up to speed on the practical application of XML Schema!

Replacing XML DTDs (Document Type Definitions) as the way in which XML documents are described and validated, XML Schema allows you to describe the structure of information in an XML document and is essential for ensuring
...
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown...

Building Data Science Teams
Building Data Science Teams
Starting in 2008, Jeff Hammerbacher (@hackingdata) and I sat down to share our experiences building the data and analytics groups at Facebook and LinkedIn. In many ways, that meeting was the start of data science as a distinct professional specialization (see “What Makes a Data Scientist?” on page 11 for the story on...
Microsoft  Windows  SharePoint  Services Inside Out
Microsoft Windows SharePoint Services Inside Out
Take your Windows SharePoint Services experience to the next level! Designed for advanced users, this supremely organized reference packs all the information you need to master every major tool, task, and enhancement in Windows SharePoint Serviceswithout the fluff. Discover how to simplify information sharing, make team collaboration more...
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
unlimited object storage image
Result Page: 96 95 94 93 92 91 90 89 88 87 86 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy