Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Koha 3 Library Management System
Koha 3 Library Management System

Koha is the first full-featured open source library management system that is widely used for efficiently managing libraries. However, setting up and maintaining Koha is no walk in the park. It is not as straightforward as setting up the other popular LAMP applications.

This practical guide provides all the essential information...

Design and Usability of Digital Libraries: Case Studies in the Asia Pacific
Design and Usability of Digital Libraries: Case Studies in the Asia Pacific

Design and Usability of Digital Libraries: Case Studies in the Asia Pacific showcases some of the best digital library practices from organizations in the Asia Pacific. Particular emphasis has been placed on the design, use and usability of digital libraries. Not only are digital libraries examined, but related technologies, the management of...

OUYA Game Development by Example
OUYA Game Development by Example

An allinclusive, fun guide to making professional 3D games for the OUYA console

About This Book

  • Create enthralling and unique games for the OUYA console
  • Learn basic scripting methods in a three-dimensional game engine
  • Polish and package your games for publishing on the OUYA...
Infrastructure Public-Private Partnerships: Decision, Management and Development
Infrastructure Public-Private Partnerships: Decision, Management and Development

Economic development and social welfare depend on the existence of effective and efficient infrastructure systems, particularly in health, energy, transportation and water, many of which are developed and managed through Public-Private Partnerships (PPPs). However, empirical evidence suggests some pitfalls in the use of these PPP...

Data Mining with Computational Intelligence (Advanced Information and Knowledge Processing)
Data Mining with Computational Intelligence (Advanced Information and Knowledge Processing)
Nowadays data accumulate at an alarming speed in various storage devices,
and so does valuable information. However, it is difficult to understand information
hidden in data without the aid of data analysis techniques, which
has provoked extensive interest in developing a field separate from machine
learning. This new field is
...
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
Business rules engines can make organizations more agile by allowing them to manage diverse sets of operating rules, such as many different contracts for goods and services with different clients. For example, business rules engines can contain interfaces that allow users to define business rules to add specific functionality to software...
Practical Load Balancing: Ride the Performance Tiger
Practical Load Balancing: Ride the Performance Tiger
The Internet, and in particular the World Wide Web, have effectively leveled the playing field for businesses and individuals around the world. Do you have a great idea for a web site or a service? Even the more advanced ideas can be relatively easily and cheaply realized without much in the way of initial outlay. You can get...
Principles and Practice of Pediatric Surgery
Principles and Practice of Pediatric Surgery
In the preface to the text that preceded this edition, we predicted that the pace of change in the clinical practice of pediatric surgery, and in our understanding of the scientific principles that are the basis for that practice, would soon render the text obsolete. That expectation was more predictable than prescient,...
Learning Microsoft Windows Server 2012 Dynamic Access Control
Learning Microsoft Windows Server 2012 Dynamic Access Control

When you know Dynamic Access Control, you know how to take command of your organization's data for security and control. This book is a practical tutorial that will make you proficient in the main functions and extensions.

Overview

  • Understand the advantages of using Dynamic Access Control and how it...
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)
Discrimination and Privacy in the Information Society: Data Mining and Profiling in Large Databases (Studies in Applied Philosophy, Epistemology and Rational Ethics)

Vast amounts of data are nowadays collected, stored and processed, in an effort to assist in  making a variety of administrative and governmental decisions. These innovative steps considerably improve the speed, effectiveness and quality of decisions. Analyses are increasingly performed by data mining and profiling technologies that...

Laser Surface Modification and Adhesion (Adhesion and Adhesives: Fundamental and Applied Aspects)
Laser Surface Modification and Adhesion (Adhesion and Adhesives: Fundamental and Applied Aspects)

The book provides a unique overview on laser techniques and applications for the purpose of improving adhesion by altering surface chemistry and topography/morphology of the substrate. It details laser surface modification techniques for a wide range of industrially relevant materials (plastics, metals, ceramics, composites) with the aim to...

Advanced Linux Networking
Advanced Linux Networking

With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful...

Result Page: 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 199 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy