Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft SharePoint Foundation 2010 Inside Out
Microsoft SharePoint Foundation 2010 Inside Out

Conquer Microsoft SharePoint Foundation 2010—from the inside out!

You're beyond the basics—so dive right in and really support collaboration. This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds. It's all muscle and no fluff. Discover how...

C# Game Programming Cookbook for Unity 3D
C# Game Programming Cookbook for Unity 3D

An Accessible, Modular Style of Game Building―Easily Start Making Games with Unity 3D

C# Game Programming Cookbook for Unity 3D presents a highly flexible core framework to create just about any type of game by plugging in different script components. Most scripts function within the game framework or...

Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud
Microsoft Azure: Planning, Deploying, and Managing Your Data Center in the Cloud

Written for IT and business professionals, this book provides the technical and business insight needed to plan, deploy and manage the services provided by the Microsoft Azure cloud. Find out how to integrate the infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) models with your existing business infrastructure while...

Game Analytics: Maximizing the Value of Player Data
Game Analytics: Maximizing the Value of Player Data

Developing a successful game in today’s market is a challenging endeavor. Thousands of titles are published yearly, all competing for players’ time and attention. Game analytics has emerged in the past few years as one of the main resources for ensuring game quality, maximizing success, understanding player behavior and enhancing...

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

Big Data Analytics with Microsoft HDInsight in 24 Hours, Sams Teach Yourself
Big Data Analytics with Microsoft HDInsight in 24 Hours, Sams Teach Yourself

With Microsoft HDInsight, business professionals and data analysts can rapidly leverage the power of Hadoop on a flexible, scalable cloud-based platform, using Microsoft's accessible business intelligence, visualization, and productivity tools. Now, in just 24 lessons of one hour or less, you can learn all the skills and...

Microsoft SharePoint 2013 Administration Inside Out
Microsoft SharePoint 2013 Administration Inside Out

Conquer Microsoft SharePoint 2013 administration—from the inside out!

Dive into SharePoint 2013 administration—and really put your systems expertise to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds. Discover how the experts deploy,...

Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts
Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts

Transform yourself into a specialist in DevOps adoption for Big Data on cloud

Key Features

  • Learn the concepts of Bigdata and Devops and Implement them
  • Get Acquainted with DevOps Frameworks Methodologies and Tools
  • A practical approach to build and work efficiently with your...
Challenges in Computational Statistics and Data Mining (Studies in Computational Intelligence)
Challenges in Computational Statistics and Data Mining (Studies in Computational Intelligence)

This volume contains nineteen research papers belonging to the

areas of computational statistics, data mining, and their applications. Those papers, all written specifically for this volume, are their authors’ contributions to honour and celebrate Professor Jacek Koronacki on the occcasion of his 70th birthday. The

...

Analytics for the Internet of Things (IoT): Intelligent analytics for your intelligent devices
Analytics for the Internet of Things (IoT): Intelligent analytics for your intelligent devices

Break through the hype and learn how to extract actionable intelligence from the flood of IoT data

Key Features

  • Make better business decisions and acquire greater control of your IoT infrastructure
  • Learn techniques to solve unique problems associated with IoT and examine and analyze data...
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms
Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms

With the reinvigoration of neural networks in the 2000s, deep learning has become an extremely active area of research, one that’s paving the way for modern machine learning. In this practical book, author Nikhil Buduma provides examples and clear explanations to guide you through major concepts of this complicated field.

...
Result Page: 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy