Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SharePoint 2010 How-To
SharePoint 2010 How-To

Need fast, reliable, easy-to-implement solutions for SharePoint 2010? This book delivers exactly what you’re looking for: step-by-step help and guidance with the tasks that users, authors, content managers, and site managers perform most often. Fully updated to reflect SharePoint 2010’s latest improvements,...

Link Mining: Models, Algorithms, and Applications
Link Mining: Models, Algorithms, and Applications

This book presents in-depth surveys and systematic discussions on models, algorithms and applications for link mining. Link mining is an important field of data mining. Traditional data mining focuses on "flat" data in which each data object is represented as a fixed-length attribute vector. However, many real-world data sets are...

Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
Dynamic Speech Models (Synthesis Lectures on Speech and Audio Processing)
In a broad sense, speech dynamics are time-varying or temporal characteristics in all stages of the human speech communication process. This process, sometimes referred to as speech chain [1], starts with the formation of a linguistic message in the speaker’s brain and ends with the arrival of the message in the...
Soil: The Skin of the Planet Earth
Soil: The Skin of the Planet Earth

The main focus of this monograph is to explain the important role of soil and the environment to a broad audience. Soil is one of the five essential factors crucial for human life. On the one hand the authors describe a responsible approach and use of soil, established on a basic knowledge of the nature of soil and the countless ongoing...

Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks
Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks
This book describes, analyzes, and recommends traffic engineering (TE) and quality of service (QoS) optimization methods for integrated voice/data dynamic routing networks. These functions control a network's response to traffic demands and other stimuli, such as link failures or node failures. TE and QoS optimization is concerned with measurement,...
Seam in Action
Seam in Action
JBoss Seam is an exciting new application framework based on the Java EE platform that is used to build rich, web-based business applications. Seam is rapidly capturing the interest of Java enterprise developers because of its focus on simplicity, ease of use, transparent integration, and scalability.

Seam in Action offers a...

Large-Scale C++ Software Design
Large-Scale C++ Software Design

This is the definitive book for all C++ software professionals involved in large development efforts such as databases, operating systems, compilers, and frameworks. It is the first C++ book that actually demonstrates how to design large systems, and one of the few books on object-oriented design specifically geared to practical aspects of...

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

EDGE for Mobile Internet
EDGE for Mobile Internet
This ground-breaking resource offers you a detailed treatment of EDGE and its critical role in the development of the mobile Internet. The book explains how this global radio based high-speed mobile data standard can be introduced into GSM/GPRS networks, improving data transmission speeds to support multimedia services. It enables you to become...
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

J2EE Connector Architecture and Enterprise Application Integration
J2EE Connector Architecture and Enterprise Application Integration
The Java(TM) 2 Enterprise Edition (J2EE) platform connector architecture is the key component in Java’s support for enterprise application integration (EAI) and for linking enterprise information systems (EISs) with Web services. Because many services are now provided through the Web, it is essential that business enterprises have an...
Mongoose for Application Development
Mongoose for Application Development

Mongoose is all about putting the data model where it should be: in your application. You can control everything from within your application in JavaScript, eliminating the need to work with the database or a separate management system.

Mongoose for Application Development is a practical, hands-on guide that takes you from...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy