Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Warehousing Fundamentals for IT Professionals
Data Warehousing Fundamentals for IT Professionals

Cutting-edge content and guidance from a data warehousing expert—now expanded to reflect field trends

Data warehousing has revolutionized the way businesses in a wide variety of industries perform analysis and make strategic decisions. Since the first edition of Data Warehousing Fundamentals, numerous...

Pay-Per-Click Search Engine Marketing: An Hour a Day
Pay-Per-Click Search Engine Marketing: An Hour a Day

The complete guide to a winning pay-per-click marketing campaign

Pay-per-click advertising-the "sponsored results" on search engine results pages-is increasingly being used to drive traffic to websites. Marketing and advertising professionals looking for a hands-on, task-based guide to every stage of creating and managing...

Data Protection for Virtual Data Centers
Data Protection for Virtual Data Centers

Essential information on how to protect data in virtual environments!

Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach,...

Holographic Data Storage: From Theory to Practical Systems
Holographic Data Storage: From Theory to Practical Systems

The modern field of nonvolatile digital information storage is a bit more than a half-century old. During its history, the field has seen a small handful of technologies (magnetic tape, magnetic hard disk, magnetic flexible disk, consumer-derived optical disk) take root as ‘mainstream’. These technologies have persisted in the...

Managing the Testing Process
Managing the Testing Process

Practical ways to run a test operation that’s driven by quality – not crisis.

The wisdom in this book does not rely on brilliant theories or any Scientific Truth other than what works--on the job, time and time again. In Managing the Testing Process, you’ll examine an integrated approach–-the bricks...

Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook

Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand....

SD Card Projects Using the PIC Microcontroller
SD Card Projects Using the PIC Microcontroller

PIC Microcontrollers are a favorite in industry and with hobbyists. These microcontrollers are versatile, simple, and low cost making them perfect for many different applications. The 8-bit PIC is widely used in consumer electronic goods, office automation, and personal projects. Author, Dogan Ibrahim, author of several PIC books has now...

Making it Big in Software: Get the Job. Work the Org. Become Great.
Making it Big in Software: Get the Job. Work the Org. Become Great.

The Software Insider’s Guide to Getting Hired and Getting to the Top!

 

Here’s all the information you need to jumpstart your software career: the best ways to get hired, move up, and blaze your way to the top! The software business...

Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
"He has written an excellent book that belongs in your personal library." Cryptologia

"Churchhouse (emer., Cardiff Univ., Wales) offers a history and explanation of codes, ciphers, cryptography, and cryptanalysis from Julius Caesar and WWII code-breaking activities to the present day including the world of the Internet.
...
The Sustainable Network: The Accidental Answer for a Troubled Planet (Sustainable Living Series)
The Sustainable Network: The Accidental Answer for a Troubled Planet (Sustainable Living Series)

"Companies with a stake in the technology industry or that have staked on the Internet (ala Google or Amazon or any of the thousands of small ecommerce companies around the world) are likely to pluck multiple nuggets of wisdom from her book."

-- Heather Clancy, business journalist

What...

Ant Colony Optimization (Bradford Books)
Ant Colony Optimization (Bradford Books)

The complex social behaviors of ants have been much studied by science, and computer scientists are now finding that these behavior patterns can provide models for solving difficult combinatorial optimization problems. The attempt to develop algorithms inspired by one aspect of ant behavior, the ability to find what computer scientists would...

Result Page: 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy