Home | Amazing | Today | Tags | Publishers | Years | Search 
Pro Data Backup and Recovery
Pro Data Backup and Recovery

Pro Data Backup and Recovery has come from the many views of people that I have interacted with during my career as a systems administrator, systems engineer, and consultant. This book is primarily geared toward the systems engineers and architects within an organization, but it will also be useful for the day-to-day functions of systems...

Information Visualization in Data Mining and Knowledge Discovery
Information Visualization in Data Mining and Knowledge Discovery

Mainstream data mining techniques significantly limit the role of human reasoning and insight. Likewise, in data visualization, the role of computational analysis is relatively small. The power demonstrated individually by these approaches to knowledge discovery suggests that somehow uniting the two could lead to increased efficiency and more...

Next-Generation Internet: Architectures and Protocols
Next-Generation Internet: Architectures and Protocols

The field of computer networking has evolved significantly over the past four decades since the development of ARPANET, the first large-scale computer network. The Internet has become a part and parcel of everyday life virtually worldwide, and its influence on various fields is well recognized. The TCP/IP protocol suite and packet...

Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)
Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)

As I write this, Java is just beginning its second decade. Unlike many other computer languages whose influence begins to wane over the years, Java’s has grown stronger with the passage of time. Java leapt to the forefront of Internet programming with its first release. Each subsequent version has solidified that position. Today,...

Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

Computers, Phones, and the Internet: Domesticating Information Technology
Computers, Phones, and the Internet: Domesticating Information Technology

During the past decade, technology has become more pervasive, encroaching more and more on our lives. Computers, cell phones, and the internet have an enormous influence not only on how we function at work, but also on how we communicate and interact outside the office. Researchers have been documenting the effect that these types of...

Just Enough Software Architecture: A Risk-Driven Approach
Just Enough Software Architecture: A Risk-Driven Approach

This is a practical guide for software developers, and different than other software architecture books. Here's why:

It teaches risk-driven architecting. There is no need for meticulous designs when risks are small, nor any excuse for sloppy designs when risks threaten your success. This book describes a way to do just...

Lean-Agile Acceptance Test-Driven Development: Better Software Through Collaboration
Lean-Agile Acceptance Test-Driven Development: Better Software Through Collaboration

Developing software with testable requirements is the theme of this book. A testable requirement is one with an acceptance test. Acceptance tests drive the development of the software. As many development groups have experienced, creating acceptance tests prior to implementing requirements decreases defects and...

The Blackwell Encyclopedic Dictionary of Finance (Blackwell Encyclopedia of Management)
The Blackwell Encyclopedic Dictionary of Finance (Blackwell Encyclopedia of Management)

Although the basic purposes of finance, and the nature of the core instruments used in attaining them, are relatively constant, recent years have seen an explosion in complexity of both products and techniques.

A number of forces are driving this explosion. The first is internationalization encompassing a dramatic growth in...

Selected Works of A.N. Kolmogorov: Volume III: Information Theory and the Theory of Algorithms
Selected Works of A.N. Kolmogorov: Volume III: Information Theory and the Theory of Algorithms

This volume is the last of three volumes devoted to the work of one of the most prominent 20th century mathematicians. Throughout his mathematical work, A.N. Kolmogorov (1903-1987) showed great creativity and versatility and his wide-ranging studies in many different areas, led to the solution of conceptual and fundamental problems and the...

IT Project Proposals: Writing to Win
IT Project Proposals: Writing to Win

Whether responding to a tender from a potential client or pitching a new IT project to the Board, a well-written proposal can be the difference between success and failure. IT Project Proposals Writing to Win can help you to create high quality, persuasive proposals that will stand out from the crowd. The author explains how to...

Professional Plone 4 Development
Professional Plone 4 Development

I suspect Martin plied me to write this foreword while out one evening during the 2010 Plone Conference in Bristol. Full from an excellent dinner and even better conversation, beer in hand, who could say no?

I've long envied Martin's ability to write. Text and code flow from his fingers at a rate that I can't even begin...

Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy