Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Enterprise Systems Architecture in Practice
Handbook of Enterprise Systems Architecture in Practice
I am not sure exactly when the importance of enterprise architecture (EA) dawned on me. What is clear is that it wasn’t a “one fine day” realization, rather a result of numerous conversations with CIOs, IT managers, CFOs, process managers, and multiple research studies that convinced me that EA is perhaps the most important and...
ASP.NET 3.5 Website Programming: Problem - Design - Solution
ASP.NET 3.5 Website Programming: Problem - Design - Solution

Dear reader, thanks for picking up this book, and welcome to the ASP.NET 3.5 Website Programming: Problem–Design–Solution, fully updated to ASP.NET version 3.5! The idea for this book was born in 2001, with ASP.NET 1.0, from the desire to have a book that teaches how to create real-world web sites. The fi rst edition was published...

Design of Reinforced Concrete Silo Groups (Building Pathology and Rehabilitation)
Design of Reinforced Concrete Silo Groups (Building Pathology and Rehabilitation)

This book offers a new calculation procedure of the structural behavior of grouped layout of silos, easy to use and with satisfactory responses.

Groups of reinforced concrete silos are structures commonly used in the food industry, where it is usually necessary to separate the storage of different types and sources of...

Peer to Peer Computing: The Evolution of a Disruptive Technology
Peer to Peer Computing: The Evolution of a Disruptive Technology
Peer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to...
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives
Uncover the Threats Lurking in the Darkness of Your Family's Computer

Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using...

Absolute Beginner's Guide to iPod and iTunes
Absolute Beginner's Guide to iPod and iTunes
If you have been toying with the idea of getting into digital music…. If you have an
iPod and aren’t sure what to do with it…. If you wish you had a good way to stop
messing around with a bunch of CDs when you want to listen to music…. If you’ve
heard great things about iPods, have seen the
...
Photoshop CS4 Workflow: The Digital Photographer's Guide
Photoshop CS4 Workflow: The Digital Photographer's Guide
In this latest edition of his bestselling guide, expert digital photographer and author Tim Grey explains how proper workflow can alleviate repetitive parts of a project to allow you to focus on producing stunning results and he reveals expert tips and techniques that automate tasks, optimize output, and reduce time spent at the computer, and...
Netduino Home Automation Projects
Netduino Home Automation Projects

With this book you could have the home of tomorrow, literally tomorrow. Its totally practical approach is perfect for the hobbyist who wants to use Netduino to automate their home. Full of fun projects and clear instructions.

Overview

  • Automate your house using a Netduino and a bunch of common...
Soft Computing for Business Intelligence (Studies in Computational Intelligence)
Soft Computing for Business Intelligence (Studies in Computational Intelligence)

The book Soft Computing for Business Intelligence is the remarkable output of a program based on the idea of joint trans-disciplinary research as supported by the Eureka Iberoamerica Network and the University of Oldenburg.

It contains twenty-seven papers allocated to three sections: Soft Computing, Business...

Cocos2d for iPhone 0.99 Beginner's Guide
Cocos2d for iPhone 0.99 Beginner's Guide

Cocos2d for iPhone is a framework for building 2D games, applications, presentations, demos, and more. It was originally made for Python and then ported to IPhone by Ricardo Quesada as an open source project with the MIT license.

This book will teach you the fundamentals of how to write games with this framework. As this book is...

Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
Disaster Recovery: Used or Misused Development Opportunity (Disaster Risk Reduction)
Disaster Recovery: Used or Misused Development Opportunity (Disaster Risk Reduction)

This book explains key lessons learned from diverse disaster situations and analyzes them within the framework of governance, education, and technology, providing a framework for disaster recovery as a development opportunity. In post-disaster situations, different types of resources are put into the affected region, varying according to...

unlimited object storage image
Result Page: 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy