Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Game Application Development: With Xamarin.Forms and ASP.NET
Understanding Game Application Development: With Xamarin.Forms and ASP.NET
Learn to build a simple data-driven mobile game application using the power of Xamarin.Forms, ASP.NET, the Web API, and SignalR with this short book. In it you will build a cross-platform mobile application that targets both iOS and Android, connect your app with your database using Entity Framework, and implement real-time...
Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure
Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure

Master all the important and tough decision-making aspects involved in architecting an Azure public cloud for your organization.

Key Features

  • Deploy Azure Active Directory and implement synchronization
  • Manage storage solutions with Azure network services
  • ...
Windows Server 2003: Best Practices for Enterprise Deployments (Tips & Technique)
Windows Server 2003: Best Practices for Enterprise Deployments (Tips & Technique)

Your one-stop Windows Server 2003 resource

Discover the fastest way to migrate to Windows Server 2003 and begin to profit from its enterprise-ready features. Learn how to use the parallel network for migration. Design an Enterprise Network Architecture and follow feature-by-feature implementations. Make the most of Active Directory as an...

Global IT Management: A Practical Approach
Global IT Management: A Practical Approach
Global IT Management presents a practical approach for initiating and reinforcing global IT, focusing on the mechanisms that need to be put in place to effectively manage IT architecture, strategy, standards, and control across sites in a multinational firm. Key considerations are explained for each domain together with concrete...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
Fiber Based Dispersion Compensation (Optical and Fiber Communications Reports)
Fiber Based Dispersion Compensation (Optical and Fiber Communications Reports)

A pulse of light spreads in time as it propagates in a fiber due to the physical phenomenon called dispersion. While dispersion can be deleterious in optical communications systems, it can also be exploited to manage the temporal and spectral shapes of pulses and their interactions with other pulses. Much of dispersion control is realized in...

SharePoint 2010 How-To
SharePoint 2010 How-To

Need fast, reliable, easy-to-implement solutions for SharePoint 2010? This book delivers exactly what you’re looking for: step-by-step help and guidance with the tasks that users, authors, content managers, and site managers perform most often. Fully updated to reflect SharePoint 2010’s latest improvements,...

Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

Spatio-temporal Networks: Modeling and Algorithms (SpringerBriefs in Computer Science)
Spatio-temporal Networks: Modeling and Algorithms (SpringerBriefs in Computer Science)
Spatio-temporal networks (STN)are spatial networks whose topology and/or attributes change with time. These are encountered in many critical areas of everyday life such as transportation networks, electric power distribution grids, and social networks of mobile users. STN modeling and computations raise significant challenges. The model must...
Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Pro Power BI Architecture: Sharing, Security, and Deployment Options for Microsoft Power BI Solutions
Architect and deploy a Power BI solution. This book will help you understand the many available options and choose the best combination for hosting, developing, sharing, and deploying a Power BI solution within your organization.

Pro Power BI Architecture provides detailed examples and explains...
Just Enough Project Management: The Indispensable Four-Step Process for Managing Any Project Better, Faster, Cheaper
Just Enough Project Management: The Indispensable Four-Step Process for Managing Any Project Better, Faster, Cheaper
The project-driven approach has proven its value, leading to spectacular results--projects delivered faster and at a more reasonable cost than ever before. Problem is, the project management process used for large projects is too cumbersome and bureaucratic for the projects most of us face, and is often more complex and costly than the problems it...
Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

unlimited object storage image
Result Page: 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy