Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to DevOps with Chocolate, LEGO and Scrum Game
Introduction to DevOps with Chocolate, LEGO and Scrum Game

Discover a role-based simulation game designed to introduce DevOps in a very unusual way. Working with LEGO and chocolate, using avatars, personas, and role cards, you will gain an understanding of the Dev and Ops roles as well as their interdependencies. Throughout the game, players go through a range of emotions and learn to expand...

SQL Server Execution Plans
SQL Server Execution Plans
Every day, out in the various online forums devoted to SQL Server, and on Twitter, the same types of questions come up repeatedly: Why is this query running slowly? Why is SQL Server ignoring my index? Why does this query run quickly sometimes and slowly at others? My response is the same in each case: have you looked at the execution plan? An...
Theory and Approaches of Group Decision Making with Uncertain Linguistic Expressions (Uncertainty and Operations Research)
Theory and Approaches of Group Decision Making with Uncertain Linguistic Expressions (Uncertainty and Operations Research)
This book mainly introduces a series of theory and approaches of group decision-making based on several types of uncertain linguistic expressions and addresses their applications. The book pursues three major objectives: (1) to introduce some techniques to model several types of natural linguistic expressions; (2) to handle these...
Sas R 9.1.3 Etl Studio: User's Guide
Sas R 9.1.3 Etl Studio: User's Guide
This manual explains how to use SAS ETL Studio to specify metadata for sources, specify metadata for targets, and create jobs that specify how data is extracted, transformed, and loaded from sources to targets.

Features that are new in SAS ETL Studio 9.1.3 include the following:

Beginning Java Objects: From Concepts To Code, Second Edition
Beginning Java Objects: From Concepts To Code, Second Edition
Learning to design objects effectively with Java is the goal of Beginning Java Objects: From Concepts to Code, an intensive yet approachable guide to object design, using UML and today's hottest programming language. Plenty of titles dig into the Java language in massive detail, but this one steps back and looks at object design first. The...
Network Protocols Handbook
Network Protocols Handbook
We are living in the IT(Information Technologies) times. The IT provides us many powerful tools that have significantly changed our way of life, work and business operations. Among all the IT advancements, Internet has the most impact in every aspect of our society for the past 20 years. From Internet, people can get instant news, communicate with...
Swarm Intelligence: From Natural to Artificial Systems (Santa Fe Institute Studies on the Sciences of Complexity)
Swarm Intelligence: From Natural to Artificial Systems (Santa Fe Institute Studies on the Sciences of Complexity)
Social insects--ants, bees, termites, and wasps--can be viewed as powerful problem-solving systems with sophisticated collective intelligence. Composed of simple interacting agents, this intelligence lies in the networks of interactions among individuals and between individuals and the environment. A fascinating subject, social insects are also a...
Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov chains are a particularly powerful and widely used tool for analyzing a variety of stochastic (probabilistic) systems over time. This monograph will present a series of Markov models, starting from the basic models and then building up to higher-order models. Included in the higher-order discussions are multivariate models, higher-order...
ISO 9001: 2000 for Software and Systems Providers:  An Engineering Approach
ISO 9001: 2000 for Software and Systems Providers: An Engineering Approach
This volume incorporates more than a decade of experience with ISO 9001, a standard created by committees of volunteers working under the aegis of the International Organization for Standardization (ISO). This volume is intended for individuals who are responsible for using ISO 9001 to implement or revitalize systematic process improvement in...
Networking (2nd Edition) (Networking Technology)
Networking (2nd Edition) (Networking Technology)

This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical...

An Introduction to Cyber Modeling and Simulation (Wiley Series in Modeling and Simulation)
An Introduction to Cyber Modeling and Simulation (Wiley Series in Modeling and Simulation)

Introduces readers to the field of cyber modeling and simulation and examines current developments in the US and internationally

This book provides an overview of cyber modeling and simulation (M&S) developments. Using scenarios, courses of action (COAs), and current M&S and simulation environments,...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

unlimited object storage image
Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy