Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff
The Facebook Era: Tapping Online Social Networks to Build Better Products, Reach New Audiences, and Sell More Stuff

“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...

My iPhone (covers 3G, 3Gs and 4 running iOS4) (4th Edition)
My iPhone (covers 3G, 3Gs and 4 running iOS4) (4th Edition)

Step-by-step instructions with callouts to iPhone images that show you exactly what to do.

 

Help when you run into iPhone problems or limitations.

 

Tips and Notes...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Oracle JD Edwards EnterpriseOne 9.0: Supply Chain Management Cookbook
Oracle JD Edwards EnterpriseOne 9.0: Supply Chain Management Cookbook
Oracle's JD Edwards EnterpriseOne Supply Chain Management (SCM) application suite aids your business in enhancing your interactions with Enterprise suppliers, and this practical cookbook provides essential implementation sequences to make the most of the suite. The functionality across the application described in this...
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

AI Game Engine Programming (Game Development Series)
AI Game Engine Programming (Game Development Series)

AI Game Engine Programming provides game developers with the tools and wisdom necessary to create modern game AI engines. It takes programmers from theory to actual game development, with usable code frameworks designed to go beyond merely detailing how a technique might be used. In addition, it surveys the capabilities of the different...

Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)
Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)

Evidenced by the success of Facebook, Twitter, and LinkedIn, online social networks (OSNs) have become ubiquitous, offering novel ways for people to access information and communicate with each other. As the increasing popularity of social networking is undeniable, scalability is an important issue for any OSN that wants to serve a large...

Making TeX Work (A Nutshell handbook)
Making TeX Work (A Nutshell handbook)

TeX is a powerful tool for creating professional quality typeset text and is unsurpassed at typesetting mathematical equations, scientific text, and multiple languages. Many books describe how you use TeX to construct sentences, paragraphs, and chapters. Until now, no book has described all the software that actually lets you build,...

Case Studies in Bayesian Statistical Modelling and Analysis
Case Studies in Bayesian Statistical Modelling and Analysis

Provides an accessible foundation to Bayesian analysis using real world models

This book aims to present an introduction to Bayesian modelling and computation, by considering real case studies drawn from diverse fields spanning ecology, health, genetics and finance. Each chapter comprises a description of the problem, the...

Evolution in Four Dimensions: Genetic, Epigenetic, Behavioral, and Symbolic Variation in the History of Life (Life and Mind: Philosophical Issues in Biology and Psychology)
Evolution in Four Dimensions: Genetic, Epigenetic, Behavioral, and Symbolic Variation in the History of Life (Life and Mind: Philosophical Issues in Biology and Psychology)

This new edition of the widely read Evolution in Four Dimensions has been revised to reflect the spate of new discoveries in biology since the book was first published in 2005, offering corrections, an updated bibliography, and a substantial new chapter. Eva Jablonka and Marion Lamb's pioneering argument proposes that there is more...

OpenCV 3 Computer Vision with Python Cookbook: Leverage the power of OpenCV 3 and Python to build computer vision applications
OpenCV 3 Computer Vision with Python Cookbook: Leverage the power of OpenCV 3 and Python to build computer vision applications

Recipe-based approach to tackle the most common problems in Computer Vision by leveraging the functionality of OpenCV using Python APIs

Key Features

  • Build computer vision applications with OpenCV functionality via Python API
  • Get to grips with image processing, multiple...
Data Mining: Concepts, Methods and Applications in Management and Engineering Design (Decision Engineering)
Data Mining: Concepts, Methods and Applications in Management and Engineering Design (Decision Engineering)
Data Mining introduces in clear and simple ways how to use existing data mining methods to obtain effective solutions for a variety of management and engineering design problems.

Data Mining is organised into two parts: the first provides a focused introduction to data mining and the second goes into greater depth on subjects
...
unlimited object storage image
Result Page: 943 942 941 940 939 938 937 936 935 934 933 932 931 930 929 928 927 926 925 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy