Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning C# 3.0: An Introduction to Object Oriented Programming (Wrox Beginning Guides)
Beginning C# 3.0: An Introduction to Object Oriented Programming (Wrox Beginning Guides)
Beginning C# is a book that offers a lot of guidance, in a format that readers find intuitive to follow. The exercise-based format of the Wrox Beginning series has a strong following by all levels of readers, and is one that works very well in the classroom or home. Written by a veteran programming instructor, this is the perfect mix of tutorial,...
Running Mainframe z on Distributed Platforms: How to Create Robust Cost-Efficient Multiplatform z Environments
Running Mainframe z on Distributed Platforms: How to Create Robust Cost-Efficient Multiplatform z Environments

Running Mainframe z on Distributed Platforms reveals alternative techniques not covered by IBM for creatively adapting and enhancing multi-user IBM zPDT environments so that they are more friendly, stable, and reusable than those envisaged by IBM. The enhancement processes and methodologies taught in this book yield multiple...

Using Websphere Studio Asset Analyzer (IBM Redbooks)
Using Websphere Studio Asset Analyzer (IBM Redbooks)

This IBM Redbook describes the functions, features, and uses of IBM WebSphere Studio Asset Analyzer for Multiplatforms Version 2 Release 2.

Part 1 presents a general overview of the product. In this part, we provide you with an introduction to the product by showing you key elements of the Web browser interface.

Part 2 presents...

Cyber Crime Investigator's Field Guide, Second Edition
Cyber Crime Investigator's Field Guide, Second Edition
In the past 30 years, growth in the area of data communications has been phenomenal, to say the least. During the Vietnam War, one of my duty stations was on an island in the China Sea. I was part of a signal intelligence group, intercepting and decoding wartime communications traffic. We did our best to decode and analyze the information we...
Modern Big Data Processing with Hadoop: Expert techniques for architecting end-to-end Big Data solutions to get valuable insights
Modern Big Data Processing with Hadoop: Expert techniques for architecting end-to-end Big Data solutions to get valuable insights

A comprehensive guide to design, build and execute effective Big Data strategies using Hadoop

Key Features

  • Get an in-depth view of the Apache Hadoop ecosystem and an overview of the architectural patterns pertaining to the popular Big Data platform
  • Conquer different data...
C Traps and Pitfalls
C Traps and Pitfalls
C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual behavior of a program to differ. The book's experienced author, Koenig, follows up with examples and helpful advice on many of these "pitfalls." Each chapter includes exercises for...
Management Science: The Art of Modeling with Spreadsheets
Management Science: The Art of Modeling with Spreadsheets

This is a book for business analysts about modeling. A model is a simplified representation of a situation or problem, and modeling is the process of building, refining, and analyzing that representation for greater insight and improved decision making. Some models are so common that they are thought of as routine instruments rather...

Unix Unleashed/Book and CD
Unix Unleashed/Book and CD
Given life by Turing Award winning Bell Labs computer scientist Ken Thompson at Murray Hill, N.J., in August 1969, UNIX spent its early years as a research curiosity. When I met up with Unix in the summer of '82, however, it already possessed the one characteristic that destined it to dominate a major chunk of the world's market for operating...
Business Process Implementation for IT Professionals and Managers
Business Process Implementation for IT Professionals and Managers

The King is dead; long live the King! That famous cry sums up most aspects of modern business practice. The previously existing competitive environment, scope, internal structures, and automation support needs of an enterprise have disappeared and been replaced by other sets of conditions and requirements. In time, those needs, too, will...

Investigating Computer-Related Crime
Investigating Computer-Related Crime
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic...
IT Audit, Control, and Security (Wiley Corporate F&A)
IT Audit, Control, and Security (Wiley Corporate F&A)
WELCOME TO THE WORLD of IT Audit, Control, and Security. Much has changed in information technology (IT) auditing since we published our first edition of this book when we were then called Computer Auditors. Back in those days, traditional mainframe or legacy computer systems were still common, we had difficulty envisioning...
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)

Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.

As the...

unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy