Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics
Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics

Praise for Praise for Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics

"A highly accessible collection of essays on contemporary thinking in performance management. Readers will get excellent overviews on the Balanced Scorecard, strategy maps, incentives, management...

Building Modern Web Applications Using Angular
Building Modern Web Applications Using Angular

Key Features

  • Learn about the core building blocks of Angular
  • Build and architect high performance web applications
  • Implement the latest JavaScript concepts in ECMAScript 2015, ECMAScript 2016, and TypeScript
  • Leverage the latest Angular features to get the most out of your web...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing...

The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
Even if the NFC standard is young (developed in 2004), I have been asked to write this book for several years now, due to the pioneering role played in France (and in Europe) by our Computer Science Master’s degree MBDS (www.mbds-fr.org) at the University of Nice – Sophia-Antipolis around the prototyping of innovative...
Flex 3 with Java
Flex 3 with Java

Flex 3 is a great technology for developing Rich Internet Applications for the Web as well as for the desktop. If you are a developer looking to design great-looking and sophisticated user interfaces that resemble desktop-based applications, and want to utilize an existing server technology such as Java to develop RIAs, this book is for you.

...
Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
The CTO Job Manual: A Wealth of Reference Material and Thought Leadership on What Every Manager Needs to Know to Lead Their Technology Team
The CTO Job Manual: A Wealth of Reference Material and Thought Leadership on What Every Manager Needs to Know to Lead Their Technology Team
Why spend countless hours searching for relevant thought leadership articles, specific pieces of statistical data, and navigable reference information, when one resource provides it all? In The CTO Handbook, former CTO of IBM Next Generation Group Mark Minevich, guides readers through what need not be a daunting world of IT management - addressing...
Peer to Peer Computing: The Evolution of a Disruptive Technology
Peer to Peer Computing: The Evolution of a Disruptive Technology
Peer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to...
Algorithm Collections for Digital Signal Processing Applications using Matlab
Algorithm Collections for Digital Signal Processing Applications using Matlab
The Algorithms such as SVD, Eigen decomposition, Gaussian Mixture Model, HMM etc. are scattered in different fields. There is the need to collect all such algorithms for quick reference. Also there is the need to view such algorithms in application point of view. Algorithm Collections for Digital Signal Processing Applications using MATLAB...
With Alexander in India and Central Asia: Moving East and Back to West
With Alexander in India and Central Asia: Moving East and Back to West

Alexander conquered most parts of the Western World, but there is a great deal of controversy over his invasion of India, the least known of his campaigns. In BC 327 Alexander came to India, and tried to cross the Jhelum river for the invasion, but was then confronted by King Porus who ruled an area in what is now the Punjab. According to...

Learning Continuous Integration with Jenkins
Learning Continuous Integration with Jenkins

Key Features

  • Speed up and increase software productivity and software delivery using Jenkins
  • Automate your build, integration, release, and deployment processes with Jenkins―and learn how continuous integration (CI) can save you time and money
  • Explore the power of continuous delivery...
Result Page: 18 17 16 15 14 13 12 11 10 9 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy