Home | Amazing | Today | Tags | Publishers | Years | Search 
PowerPivot for Business Intelligence Using Excel and SharePoint
PowerPivot for Business Intelligence Using Excel and SharePoint

PowerPivot comprises a set of technologies for easy access to data mining and business intelligence analysis from Microsoft Excel and SharePoint. Power users and developers alike can create sophisticated, online analytic processing (OLAP) solutions using PowerPivot for Excel, and then share those solutions with other users via PowerPivot for...

Magento 1.4 Development Cookbook
Magento 1.4 Development Cookbook

Magento is the fastest growing PHP-based eCommerce solution based on the Zend Framework. This robust CMS helps developers to enrich their store with more useful functionalities with custom modules. Developing a Magento store to get the desired look and feel is not as easy as you might believe, and may take hours due to the wealth of...

Agile Software Requirements: Lean Requirements Practices for Teams, Programs, and the Enterprise
Agile Software Requirements: Lean Requirements Practices for Teams, Programs, and the Enterprise

In the past decade, the movement to lighter-weight and increasingly agile methods has been the most significant change to affect the software enterprise since the advent of the waterfall model in the 1970s. Originated by a variety of thought and practice leaders and proven in real-world, successful experiments, the methods have proven...

CompTIA Security+ SYO-201 Cert Guide
CompTIA Security+ SYO-201 Cert Guide

Welcome to the CompTIA Security+ SY0-201 Cert Guide. The CompTIA Security+ Certification is widely accepted as the first security certification you should attempt to attain in your information technology (IT) career. The CompTIA Security+ Certification is designed to be a vendor-neutral exam that measures your knowledge of...

Recent Developments in the Ordered Weighted Averaging Operators: Theory and Practice
Recent Developments in the Ordered Weighted Averaging Operators: Theory and Practice

The area of aggregation operations is one of the most promising off-springs of fuzzy sets theory. Before Zadeh introduced fuzzy set connectives in 1965, there was a wide gap between logic and decision sciences. On the one hand, multiplevalued logics proposed many-valued extensions of the conjunctions and disjunctions for which the...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Word Sense Disambiguation: Algorithms and Applications (Text, Speech and Language Technology)
Word Sense Disambiguation: Algorithms and Applications (Text, Speech and Language Technology)

Word sense disambiguation is a core research problem in computational linguistics, which was recognized at the beginning of the scientific interest in machine translation and artificial intelligence. And yet no book has been fully devoted to review the wide variety of approaches to solving the problem. The time is right for such a...

Multiobjective Genetic Algorithms for Clustering: Applications in Data Mining and Bioinformatics
Multiobjective Genetic Algorithms for Clustering: Applications in Data Mining and Bioinformatics

Clustering is an important unsupervised classification technique where a set of patterns, usually vectors in multidimensional space, are grouped into clusters based on some similarity or dissimilarity criteria. In crisp clustering, each pattern is assigned to exactly one cluster, whereas in fuzzy clustering, each pattern is given a...

Understanding Digital Signal Processing (3rd Edition)
Understanding Digital Signal Processing (3rd Edition)

Amazon.com’s Top-Selling DSP Book for Seven Straight Years—Now Fully Updated!

Understanding Digital Signal Processing, Third Edition, is quite simply the best resource for engineers and other technical professionals who want to master and apply today’s latest DSP...

Electronic and Algorithmic Trading Technology: The Complete Guide
Electronic and Algorithmic Trading Technology: The Complete Guide

Electronic and algorithmic trading has become part of a mainstream response to buy-side traders' need to move large blocks of shares with minimum market impact in today's complex institutional trading environment. This book illustrates an overview of key providers in the marketplace. With electronic trading platforms becoming...

Advances in Knowledge Discovery and Data Mining: 15th Pacific-Asia Conference, PAKDD 2011
Advances in Knowledge Discovery and Data Mining: 15th Pacific-Asia Conference, PAKDD 2011

PAKDD has been recognized as a major international conference in the areas of data mining (DM) and knowledge discovery in databases (KDD). It provides an international forum for researchers and industry practitioners to share their new ideas, original research results and practical development experiences from all KDD-related areas...

IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)
IT Security Management: IT Securiteers - Setting up an IT Security Function (Lecture Notes in Electrical Engineering)

In 1862, the gardener James Bateman sent several specimens of the Christmas orchid to Charles Darwin. This orchid was first planted in Britain in 1855 and it did not blossom until 1857. It had been discovered several decades before by the French botanist Louis-Marie Aubert du Petit-Thouars in Madagascar in 1822. The most significant...

Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy