Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mac OS X Help Line, Tiger Edition
Mac OS X Help Line, Tiger Edition
With every update, Mac OS X grows more powerful, more dependable, and easier to use--and Mac OS X Tiger is no exception. But along with the new features come fresh issues--new areas to troubleshoot, new functionality to unravel, and new glitches waiting to confound even the savviest Mac users. Not to worry. Best-selling author and Mac guru Ted...
Chemical Process Safety: Learning from Case Histories
Chemical Process Safety: Learning from Case Histories
"Given his extensive background in an industrial setting as a team leader at the PPG Chlor-Alkali Plant in Louisiana and the safety course that he taught for AIChE with the well-known safety expert Trevor Kletz, the quantity of information of a practical nature contained in this book is not surprising."
 - Gary Bennett,
...
Post-mining of Association Rules: Techniques for Effective Knowledge Extraction
Post-mining of Association Rules: Techniques for Effective Knowledge Extraction

Since its introduction for market basket analysis in the early 1990s, association rule mining has had a lot of research attention, and it is now widely used in many fields, for example in retail, telecom, insurance, and bioinformatics applications.

One familiar problem encountered in association mining exercises is that they...

IBM EServer Certification Study Guide - Pseries Aix System Support
IBM EServer Certification Study Guide - Pseries Aix System Support
This redbook is designed as a study guide for professionals wishing to prepare for the certification exam to achieve: IBM eserver Certified Specialist - pSeries AIX System Support. The system support certification validates a broad scope of AIX problem determination and resolution skills and the ability to perform general AIX software system...
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
The Principles of Project Management (SitePoint: Project Management)
The Principles of Project Management (SitePoint: Project Management)

The Principles of Project Management lays out clear steps that anyone can follow to get projects done right, and delivered on time.

This full color book covers:

Why Project Management is important The 6 fundamental truths of project management Getting started: Discovering, Initiating, Planning
...
Ajax Hacks : Tips & Tools for Creating Responsive Web Sites
Ajax Hacks : Tips & Tools for Creating Responsive Web Sites

Ajax, the popular term for Asynchronous JavaScript and XML, is one of the most important combinations of technologies for web developers to know these days. With its rich grouping of technologies, Ajax developers can create interactive web applications with XML-based web services, using JavaScript in the browser to process the...

SAP NetWeaver Business Warehouse: Administration and Monitoring
SAP NetWeaver Business Warehouse: Administration and Monitoring

This book offers a complete understanding of all administration tasks that arise in a live SAP NetWeaver BW system and provides guidance on ways to solve any problems that might occur. Coverage includes all topics relevant to administration and monitoring of SAP NetWeaver BW, including basic principles, tasks, analysis, and...

The Biology of Schwann Cells: Development, Differentiation and Immunomodulation
The Biology of Schwann Cells: Development, Differentiation and Immunomodulation
It is now over 200 years since Theodore Schwann first described the cell which bears his name. Such early descriptions of nervous system components were done without the powerful microscopes we have today, yet Schwann and Ramon Y. Cajal made foundation observations which still stand. Cajal’s papers, especially, show the...
Microsoft Dynamics CRM 2011 Cookbook
Microsoft Dynamics CRM 2011 Cookbook

Includes over 75 incredible recipes for deploying, configuring, and customizing your CRM application

Overview

  • Step-by-step guide to deploy Dynamics CRM 2011 components, configuring claim-based authentication and IFD deployment
  • Focus on Dynamics CRM 2011 server maintenance and optimization...
Oracle Essbase 9 Implementation Guide
Oracle Essbase 9 Implementation Guide

The hot new data analysis trends involve business intelligence and analytics. The technology that supports business intelligence and analytics better than anything else is today's multidimensional OLAP technology - and there is none better than Oracle Essbase! Although storing data in a cube and developing analytical applications leaves...

Cisco ISP Essentials
Cisco ISP Essentials
A comprehensive guide to the best common practices for Internet service providersLearn the best common practices for configuring routers on the Internet from experts who helped build the InternetGain specific advice through comprehensive coverage of all Cisco routers and current versions of Cisco IOS SoftwareUnderstand the Cisco IOS tools essential...
unlimited object storage image
Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy