Home | Amazing | Today | Tags | Publishers | Years | Search 
The Google Way: How One Company Is Revolutionizing Management as We Know It
The Google Way: How One Company Is Revolutionizing Management as We Know It

Shortly after World War I, Ford and GM created the large modern corporation, with its financial and statistical controls, mass production, and assembly lines. In the 1980s, Toyota stood out for combining quality with continuous refinement. Today, Google is reinventing business yet again-the way we work, how organizations are controlled,...

Language Implementation Patterns: Create Your Own Domain-Specific and General Programming Languages
Language Implementation Patterns: Create Your Own Domain-Specific and General Programming Languages
Knowing how to create domain-specific languages (DSLs) can give you a huge productivity boost. Instead of writing code in a general-purpose programming language, you can first build a custom language tailored to make you efficient in a particular domain.

The key is understanding the common patterns found across language
...
Earth's Oldest Rocks, Volume 15 (Developments in Precambrian Geology)
Earth's Oldest Rocks, Volume 15 (Developments in Precambrian Geology)

Earth's Oldest Rocks provides a comprehensive overview of all aspects of early Earth, from planetary accretion through to development of protocratons with depleted lithospheric keels by c. 3.2 Ga, in a series of papers written by over 50 of the world's leading experts. The book is divided into two chapters on early Earth history, ten...

C# 4.0 in a Nutshell: The Definitive Reference
C# 4.0 in a Nutshell: The Definitive Reference

What people are saying about C# 4.0 in a Nutshell

"C# 4.0 in a Nutshell is one of the few books I keep on my desk as a quick reference. It is a book I recommend." --Scott Guthrie, Corporate Vice President, .NET Developer Platform, Microsoft Corporation

"A must-read for a concise...

Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers

This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.

The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.

The papers dealt with subjects like virtual business alliances,...

Parameter Estimation for Scientists and Engineers
Parameter Estimation for Scientists and Engineers
The subject of this book is estimating parameters of expectation models of statistical observations. The book describes what I consider the most important aspects of the subject for applied scientists and engineers. From experience, I know that this group of users is often not aware of estimators other than least squares. Therefore, one of my...
SharePoint 2007 Development Recipes: A Problem-Solution Approach (Expert's Voice in Sharepoint)
SharePoint 2007 Development Recipes: A Problem-Solution Approach (Expert's Voice in Sharepoint)
Welcome to SharePoint 2007 Development Recipes: A Problem-Solution Approach! What you’re about to read is the result of an idea thread that’s been rolling around in my head for several years—the need for a practical guide that empowers and enables developers to leverage the full potential of SharePoint in the enterprise.
...
Professional ASP.NET 3.5: In C# and VB (Programmer to Programmer)
Professional ASP.NET 3.5: In C# and VB (Programmer to Programmer)

Professional ASP.NET 3.5 In C# and VB

ASP.NET 3.5 brings the power of Visual Studio 2008 along with the multitude of language improvements in C# 2008 and Visual Basic 2008 as well as powerful new technology called LINQ, together with the ASP.NET 2.0 Framework you already know and love. Combine all this with the...

Secure Transaction Protocol Analysis: Models and Applications (Lecture Note in Computer Science)
Secure Transaction Protocol Analysis: Models and Applications (Lecture Note in Computer Science)
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to...
Pro Java EE Spring Patterns: Best Practices and Design Strategies Implementing Java EE Patterns with the Spring Framework
Pro Java EE Spring Patterns: Best Practices and Design Strategies Implementing Java EE Patterns with the Spring Framework
This book combines the Java EE design patterns with the Spring Framework. The Java EE design pattern catalog provides an invaluable reference for any Java EE application design and architecture. The Spring Framework, on the other hand, is the de facto standard for Java EE. Spring, with its inherently simple programming model and emphasis on object...
The Relational Database Dictionary, Extended Edition (Firstpress)
The Relational Database Dictionary, Extended Edition (Firstpress)

Chris Date, one of the founders of the relational model, has updated and expanded his relational database dictionary to be current with over 900 terms.

What you’ll learn

  • Over 900 relational database terms defined
  • Precise and concise definitions, unlike those found on...
Information Assurance Architecture
Information Assurance Architecture
Safeguard Your Organization’s Information!

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information...

Result Page: 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy