Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
UX Optimization: Combining Behavioral UX and Usability Testing Data to Optimize Websites
UX Optimization: Combining Behavioral UX and Usability Testing Data to Optimize Websites
Combine two typically separate sources of data?behavioral quantitative data and usability testing qualitative data?into a powerful single tool that helps improve your organization’s website by increasing conversion and ROI. The combination of the what is happening data of website activity, coupled with the...
Factor Separation in the Atmosphere: Applications and Future Prospects
Factor Separation in the Atmosphere: Applications and Future Prospects

Modeling atmospheric processes in order to forecast the weather or future climate change is an extremely complex and computationally intensive undertaking. One of the main difficulties is that there are a huge number of factors that need to be taken into account, some of which are still poorly understood. The Factor Separation (FS) method is...

Web Services : Theory and Practice
Web Services : Theory and Practice
Web Services describes a pivotal application enabling technology that takes reusable object technology to new heights and then marries it with the Web. Web services impact everything to do with applications—including applications that enterprises already own. However, there is a preponderance of confusion and misunderstanding...
Data Mining Methods and Models
Data Mining Methods and Models
Apply powerful Data Mining Methods and Models to Leverage your Data for Actionable Results

Data Mining Methods and Models provides:

  • The latest techniques for uncovering hidden nuggets of information
  • The insight into how the data mining algorithms actually work
  • The hands-on experience of...
Pro .NET 2.0 Extreme Programming (Expert's Voice)
Pro .NET 2.0 Extreme Programming (Expert's Voice)
The target audience for this title are current .NET 1.1 developers and future .NET 2.0 developers who need to put Extreme Programming (XP) into practice. While other Extreme Programming books are usually theoretical in approach, this book takes the reader through the practical application of Extreme Programming with code-level solutions. It shows...
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
IPv6 for Enterprise Networks (Networking Technology)
IPv6 for Enterprise Networks (Networking Technology)

Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communication among devices of all types on the Internet. IPv6 has been in existence for many years, but recently the deployment of IPv6 has accelerated greatly in the enterprise. IPv6 has been under continuous development and is maturing as real-world...

Modeling Financial Markets : Using Visual Basic.NET and Databases to Create Pricing, Trading, and Risk Management Models
Modeling Financial Markets : Using Visual Basic.NET and Databases to Create Pricing, Trading, and Risk Management Models
Although this book follows the layout of a programming book, the underlying theme is financial modeling and quantitative trading system development. In a sense, this book really marries four disciplines—computer science, quantitative finance, trading strategy, and quality development—into one, financial engineering....
Modeling Methodology for Physiology and Medicine, Second Edition (Academic Press Series in Biomedical Engineering)
Modeling Methodology for Physiology and Medicine, Second Edition (Academic Press Series in Biomedical Engineering)

Modelling Methodology for Physiology and Medicine, Second Edition, offers a unique approach and an unprecedented range of coverage of the state-of-the-art, advanced modeling methodology that is widely applicable to physiology and medicine. The second edition, which is completely updated and expanded, opens with a clear and integrated...

Java Software Solutions (8th Edition)
Java Software Solutions (8th Edition)

Note: You are purchasing a standalone product; MyProgrammingLab does not come packaged with this content. If you would like to purchase both the physical text and MyProgrammingLab  search for ISBN-10: 0133796280/ISBN-13: 9780133796285. That package includes ISBN-10: 0133594955/ISBN-13: 9780133594959 and...

Co-verification of Hardware and Software for ARM SoC Design (Embedded Technology)
Co-verification of Hardware and Software for ARM SoC Design (Embedded Technology)
This book is the first to document and teach important information about the verification technique known as hardware/software co-verification. Traditional embedded system design has evolved into single chip designs that are pushing past 1M logic gates and headed toward 10M gates. In this era of SoC design, chips now include microprocessors and...
EPSS Revisited: A Lifecycle for Developing Performance-Centered Systems
EPSS Revisited: A Lifecycle for Developing Performance-Centered Systems

EPSS Revisited is a compendium of articles gathered primarily from four special issues of ISPI's Performance Improvement (PI) journal between July 1999 and December 2002. These were issues for which I served as guest editor during a period when I was refining a performance-centered design...

unlimited object storage image
Result Page: 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy