Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Full Stack Web Development with Backbone.js
Full Stack Web Development with Backbone.js

Learn how to build a full-stack application with Backbone.js by taking advantage of JavaScript modules, workflow automation, and Backbone’s interface building blocks. With this practical guide, author Patrick Mulder takes experienced backend developers and JavaScript programmers through the steps necessary to create a fully...

The AI Business: The Commercial Uses of Artificial Intelligence
The AI Business: The Commercial Uses of Artificial Intelligence

What is the bottom line on Artificial Intelligence? The AI Business offers a comprehensive summary of the commercial picture, present and future, for Artificial Intelligence in the computer industry, medicine, the oil industry, and electronic design. AI's brightest and best - financiers, researchers, and users - analyze current...

Unix Shell Programming, Third Edition
Unix Shell Programming, Third Edition

Unix Shell Programming is a tutorial aimed at helping Unix and Linux users get optimal performance out of their operating out of their operating system. It shows them how to take control of their systems and work efficiently by harnessing the power of the shell to solve common problems. The reader learns everything he or she needs to know to...

Best Practices in Talent Management: How the World's Leading Corporations Manage, Develop, and Retain Top Talent
Best Practices in Talent Management: How the World's Leading Corporations Manage, Develop, and Retain Top Talent

Praise for BEST PRACTICES in TALENT MANAGEMENT

"This book includes the most up-to-date thinking, tools, models, instruments and case studies necessary to identify, lead, and manage talent within your organization and with a focus on results. It provides it all—from thought leadership to real-world...

Information Operations Planning
Information Operations Planning
Information operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with...
Network Processor Design, Volume 2: Issues and Practices, Volume 2
Network Processor Design, Volume 2: Issues and Practices, Volume 2
Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to...
Java Open Source Programming: with XDoclet, JUnit, WebWork, Hibernate
Java Open Source Programming: with XDoclet, JUnit, WebWork, Hibernate
 Discover how to develop full-scale J2EETM applications quickly and efficiently using the best Open Source tools

Written by leading authorities in the field, this book shows you how to leverage a suite of best-of-breed Open Source development tools to take the pain out of J2EE and build a complete...

Bass Guitar for Dummies
Bass Guitar for Dummies
Shake the earth with deep, sonorous vibrations. Be the force that relentlessly drives the music. Rumble like the ominous thunder of an approaching storm. For you, it's not enough just to be heard; you need to be felt, too. You need to play bass guitar.

Imagine your favorite music without bass. It doesn't work, does it? The bass is...

Services and Business Computing Solutions With Xml: Applications for Quality Management and Best Processes
Services and Business Computing Solutions With Xml: Applications for Quality Management and Best Processes
Commercial systems built today are increasingly using XML technologies for storing any amount of text or data.

Services and Business Computing Solutions with XML: Applications for Quality Management and Best Processes collects the latest research for academicians and practitioners that describes the use and synergy between...

Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Behind the Berlin Wall: East Germany and the Frontiers of Power
Behind the Berlin Wall: East Germany and the Frontiers of Power

Few historical changes occur literally overnight, but on August 13 1961 eighteen million East Germans awoke to find themselves walled in by an edifice which was to become synonymous with the Cold War: the Berlin Wall.

This new history rejects traditional, top-down approaches to Cold War politics, exploring instead how the border
...

Beacon Technologies: The Hitchhiker's Guide to the Beacosystem
Beacon Technologies: The Hitchhiker's Guide to the Beacosystem

Learn the key standards―iBeacon, Eddystone, Bluetooth 4.0, and AltBeacon―and how they work with other proximity technologies. Then build your understanding of the proximity framework and how to identify and deploy the best solutions for your own business, institutional, or consulting needs.

Proximity technology―in...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy