Home | Amazing | Today | Tags | Publishers | Years | Search 
Social Knowledge: Using Social Media to Know What You Know (Premier Reference Source)
Social Knowledge: Using Social Media to Know What You Know (Premier Reference Source)
Unlike many of the management movements of the last half century knowledge management has no single origin or unambiguous instantiation. Business Process Reengineering, the Balanced Score Card and the Learning Organisation (to mention but a few) all originate with a single book which then defines the field. In Knowledge Management...
High Performance MySQL: Optimization, Backups, and Replication
High Performance MySQL: Optimization, Backups, and Replication
We wrote this book to serve the needs of not just the MySQL application developer but also the MySQL database administrator. We assume that you are already relatively experienced with MySQL. We also assume some experience with general system administration, networking, and Unix-like operating systems.

The second edition of
...
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Windows Internals, Sixth Edition is intended for advanced computer professionals (both developers and system administrators) who want to understand how the core components of the Microsoft Windows 7 and Windows Server 2008 R2 operating systems work internally. With this knowledge, developers can better...
Rules of Play: Game Design Fundamentals
Rules of Play: Game Design Fundamentals
For hundreds of years, the field of game design has drifted along under the radar of culture, producing timeless masterpieces and masterful time-wasters without drawing much attention to itself-without, in fact, behaving like a "field" at all. Suddenly, powered by the big bang of computer technology, game design has...
Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Sputtering by Particle Bombardment: Experiments and Computer Calculations from Threshold to MeV Energies
Within the last 15 years in the field of “sputtering by particle bombardment” several new and important results have been published in internal reports, in PhD thesis, as well as in the open literature. This relates especially to a more detailed understanding of the sputtering process by computational means such as...
Microsoft Windows Identity Foundation Cookbook
Microsoft Windows Identity Foundation Cookbook
I still remember sitting down with my brand new copy of Writing Secure Code by Michael Howard and David LeBlanc. Having moved beyond writing relatively simple intranet web reports, (before the term "Bl" came to embody what at the time we thought was an incredibly innovative way to display call center metrics for managing...
Beginning Microsoft SQL Server 2012 Programming
Beginning Microsoft SQL Server 2012 Programming
OUT OF EVERY ENDING COMES the beginning of something new. This title has been Rob Vieira’s for many years, and now he’s wrapping up that chapter of his life while I begin a new chapter of my own — and the fi rst chapter of this text. Likewise, you, as a reader, are also entering something of a transition; you know...
Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective
Intelligent Learning Infrastructure for Knowledge Intensive Organizations: A Semantic Web Perspective
In the knowledge society, the traditional facts of business life are volatile and not given. Every organization is challenged in this context, to enrich its sensors, and its internal processes toward the exploitation of tangible and intangible resources.

During the last few years, an important shift in management
...
OS X and iOS Kernel Programming
OS X and iOS Kernel Programming
Kernel development can be a daunting task and is very different from programming traditional user applications. The kernel environment is more volatile and complex. Extraordinary care must be taken to ensure that kernel code is free of bugs because any issue may have serious consequences to the stability, security, and performance...
User-Centered Agile Methods (Synthesis Lectures on Human-Centered Informatics)
User-Centered Agile Methods (Synthesis Lectures on Human-Centered Informatics)
Agile methods have transformed how developers think about organizing the development of a project. Rather than months (or years) of development, followed by months of field test leading up to a release, agile methods organize development into short iterations with continuous testing and a flexible release date. The agile approach...
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
CyberForensics: Understanding Information Security Investigations (Springer's Forensic Laboratory Science Series)
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It briefly describes the history of the cyberforensics field and places the subsequent chapters into context. The last section of the introduction, Expert Explanations, describes the format of the following sections and also how the sections complement...
Beginning PhoneGap: Mobile Web Framework for JavaScript and HTML5
Beginning PhoneGap: Mobile Web Framework for JavaScript and HTML5

PhoneGap is a growing and leading open-source mobile web apps development framework that lets developers build JavaScript and HTML5-based web applications with native wrappers for more than six mobile platforms, including iOS, Android, and BlackBerry. This framework lets you build HTML- and JavaScript-based apps and still take advantage...

Result Page: 64 63 62 61 60 59 58 57 56 55 54 53 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy