Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Models and ICT Technologies for the Fashion Supply Chain: Proceedings of IT4Fashion 2017 and IT4Fashion 2018 (Lecture Notes in Electrical Engineering (525))
Business Models and ICT Technologies for the Fashion Supply Chain: Proceedings of IT4Fashion 2017 and IT4Fashion 2018 (Lecture Notes in Electrical Engineering (525))

This book presents high-quality original contributions on the fashion supply chain. A wide spectrum of application domains are covered, processing of big data coming from digital and social media channels, fashion new product development, fashion design, fashion marketing and communication strategy, business models and...

Data Protection
Data Protection

This is the fundamental truth about data protection: backup is dead.

Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.

So what is data...

CISA Certified Information Systems Auditor Study Guide
CISA Certified Information Systems Auditor Study Guide

The industry-leading study guide for the CISA exam, fully updated

More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated...

Expert Oracle Application Express
Expert Oracle Application Express

Expert Oracle Application Express, 2nd Edition is newly updated for APEX 5.0 and brings deep insight from some of the best APEX practitioners in the field today. You'll learn about important features in APEX 5.0, and how those can be applied to make your development work easier and with greater impact on your business. Oracle...

Learning Cocoa with Objective-C: Developing for the Mac and iOS App Stores
Learning Cocoa with Objective-C: Developing for the Mac and iOS App Stores

Get up to speed on Cocoa and Objective-C, and start developing applications on the iOS and OS X platforms. If you don’t have experience with Apple’s developer tools, no problem! From object-oriented programming to storing app data in iCloud, the fourth edition of this book covers everything you need to build apps for the...

Beginning Hibernate
Beginning Hibernate

Beginning Hibernate, Third Edition is ideal if you’re experienced in Java with databases (the traditional, or "connected," approach), but new to open-source, lightweight Hibernate, a leading object-relational mapping and database-oriented application development framework.

This book packs in information...

Proceedings of the Tiangong-2 Remote Sensing Application Conference: Technology, Method and Application (Lecture Notes in Electrical Engineering)
Proceedings of the Tiangong-2 Remote Sensing Application Conference: Technology, Method and Application (Lecture Notes in Electrical Engineering)
This book gathers a selection of peer-reviewed papers presented at the Tiangong-2 Data Utilization Conference, which was held in Beijing, China, in December 2018. As the first space laboratory in China, Tiangong-2 carries 3 new types of remote sensing payloads – the Wide-band Imaging Spectrometer (WIS), Three-dimensional Imaging...
SHARKS in the MOAT: How to Create Truly Secure Software
SHARKS in the MOAT: How to Create Truly Secure Software
Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how...
Microsoft Tabular Modeling Cookbook
Microsoft Tabular Modeling Cookbook

No prior knowledgeof tabular modeling is needed to benefit from this brilliant cookbook. This is the total guide to developing and managing analytical models using the Business Intelligence Semantic Models technology.

Overview

  • Develop tabular models for personal use
  • Learn about the modeling...
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
The Business and Culture of Digital Games: Gamework and Gameplay
The Business and Culture of Digital Games: Gamework and Gameplay
"Fusing digital technologies and cultural creativity, exploiting global networks of production and distribution with little regulation and embodying the liberal ideas of individual choice and agency, digital games seem to epitomize global post-industrial neo-liberal cultural products. Kerr finds reality a bit more complex. For all their...
The Business and Culture of Digital Games: Gamework and Gameplay
The Business and Culture of Digital Games: Gamework and Gameplay
"Fusing digital technologies and cultural creativity, exploiting global networks of production and distribution with little regulation and embodying the liberal ideas of individual choice and agency, digital games seem to epitomize global post-industrial neo-liberal cultural products. Kerr finds reality a bit more complex. For all their...
Result Page: 33 32 31 30 29 28 27 26 25 24 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy