Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Go in Practice: Includes 70 Techniques
Go in Practice: Includes 70 Techniques

Summary

Go in Practice guides you through 70 real-world techniques in key areas like package management, microservice communication, and more. Following a cookbook-style Problem/Solution/Discussion format, this practical handbook builds on the foundational concepts of the Go language and introduces specific...

The Complete Guide to Flipping Properties
The Complete Guide to Flipping Properties
Fix and flip single-family houses for quick profit––and long-term prosperity

The Complete Guide to Flipping Properties offers proven, straightforward guidance for anyone interested in flipping properties for quick profits. This comprehensive guide to flipping will help any real estate investor design a detailed plan for achieving...

Imaging for Detection and Identification (NATO Security through Science Series B: Physics and Biophysics)
Imaging for Detection and Identification (NATO Security through Science Series B: Physics and Biophysics)

The chapters in this volume were presented at the July–August 2006 NATO Advanced Study Institute on Imaging for Detection and Identification. The conference was held at the beautiful Il Ciocco resort near Lucca, in the glorious Tuscany region of northern Italy. For the eighth time we gathered at this idyllic spot to explore and...

Software and Systems Traceability
Software and Systems Traceability
Software engineering is a pessimistic discipline. The glass is always half empty rather than half full. Not surprising really, we are hardened to the grind of improving quality, painstakingly testing and, never quite, eliminating bugs. Critical review is of the essence. We know there is “no silver bullet”.

...
The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, Second Edition
The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, Second Edition
Pass the CISSP and ISSEP exams with this new edition of the bestselling prep guide!

The U.S. government has mandated that all contractors–nearly all current CISSPs, and those yet to be certified as CISSPs–attain the security engineering subject certification Information Systems Security Engineering Professional (ISSEP). The ISSEP...

Embedded Hardware (Newnes Know It All)
Embedded Hardware (Newnes Know It All)
"The authors know their subject and present it well. Examples include C and BASIC code that will run on a PIC12F675 microcontroller."

"If you want information about the overall aspects of empbedded-system design, this book deserves a look."

"David Katz and Rick Gentile of Analog Devices do an admirable
...
Practical Business Intelligence with SQL Server 2005
Practical Business Intelligence with SQL Server 2005

Design, Build, and Manage High-Value BI Solutions with SQL Server 2005

 

In this book, two of Microsoft’s leading consultants illustrate how to use SQL Server 2005 Business Intelligence (BI) technologies to solve real-world problems in...

Building Secure Wireless Networks with 802.11
Building Secure Wireless Networks with 802.11
An implementer’s guide to setting up, configuring, and managing a secure wireless network

Whether you’re creating wireless networks for the home, small office, or enterprise, this innovative book presents a step-by-step approach to successfully building a wireless LAN that meets all of your security needs. Beginning with a...

Modeling Structured Finance Cash Flows with MicrosoftВ Excel: A Step-by-Step Guide (Wiley Finance)
Modeling Structured Finance Cash Flows with MicrosoftВ Excel: A Step-by-Step Guide (Wiley Finance)
A practical guide to building fully operational financial cash flow models for structured finance transactions

Structured finance and securitization deals are becoming more commonplace on Wall Street. Up until now, however, market participants have had to create their own models to analyze these deals, and new entrants have...

Embedded Systems (World Class Designs)
Embedded Systems (World Class Designs)
"Novice developers will find this book to be invaluable. But more experienced developers will enjoy the breadth and probably pick up a few tricks or insights in less familiar areas." - William Wong, Electronic Design, June 2008

All the design and development inspiration and direction an embedded engineer
...
The Definitive Guide to NetBeans™ Platform 7
The Definitive Guide to NetBeans™ Platform 7
With this work in your hands, you hold the most current and the most comprehensive guide to the Swing-based rich client platform, NetBeans Platform 7. This theme-rich client platform is highly topical. In addition to the NetBeans Platform, Eclipse RCP is also a principal representative of this category. The development of these two...
Evolutionary Algorithms (The IMA Volumes in Mathematics and its Applications)
Evolutionary Algorithms (The IMA Volumes in Mathematics and its Applications)

The IMA Workshop on Evolutionary Algorithms brought together many of the top researchers in the area of Evolutionary Computation for a week of intensive interaction. The field of Evolutionary Computation has developed significantly over the past 30 years and today consists of a variety of subfields such as genetic algorithms, evolution...

unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy