Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro Hibernate 3 (Expert's Voice)
Pro Hibernate 3 (Expert's Voice)

Pro Hibernate 3 is the first book to offer complete coverage of the open source lightweight Hibernate 3 and its new features. Authors Dave Minter and Jeff Linwood discuss the new persistence layer and share design tips and best practices. And the duo goes beyond just explaining "how to" use parts of Hibernate; they probe well...

CherryPy Essentials: Rapid Python Web Application Development
CherryPy Essentials: Rapid Python Web Application Development
This book covers the CherryPy library for Python web development from its history and installation through its main features and core concepts to its integration with Python and other products to construct, test, and deploy a sample photoblog application. The author Sylvain Hellegouarch is dedicated to the development of free software projects and...
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems

 

For every IT executive, manager, architect, program leader, project leader, and lead analyst

 

...
Magento 1.3: PHP Developer's Guide
Magento 1.3: PHP Developer's Guide

Design, develop, and deploy feature-rich Magento online stores with PHP coding

  • Extend and customize the Magento e-commerce system using PHP code
  • Set up your own data profile to import or export data in Magento
  • Build applications that interface with the customer, product, and order data using...
Visual C# 2010 Recipes: A Problem-Solution Approach
Visual C# 2010 Recipes: A Problem-Solution Approach

Mastering the development of .NET 4.0 applications in C# is less about knowing the Visual C# 2010 language and more about knowing how to use the functionality of the .NET Framework class library most effectively. Visual C# 2010 Recipes explores the breadth of the .NET Framework class library and provides specific solutions to common...

Windows Server 2012 Unified Remote Access Planning and Deployment
Windows Server 2012 Unified Remote Access Planning and Deployment

DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology world-famous. Now, with Windows Server 2012,...

Protect Your Wealth from the Ravages of Inflation: A Three-Step Method
Protect Your Wealth from the Ravages of Inflation: A Three-Step Method

Protect Your Wealth from the Ravages of Inflation is for people who have financial assets to protect in an unpredictable, inflationary environment. Maybe you have tried traditional financial advice, financial planning, and passive investment management techniques and you’re still losing ground. Maybe you’re worried that...

wxPython Recipes: A Problem - Solution Approach
wxPython Recipes: A Problem - Solution Approach

Quickly discover solutions to common problems, learn best practices, and understand everything wxPython has to offer. This book is for anyone wanting to learn more about how to use the wxPython desktop GUI toolkit. It assumes some prior knowledge of Python and a general understanding of wxPython or GUI development, and contains more than 50...

Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
The application of Data Mining (DM) technologies has shown an explosive growth in an increasing number of different areas of business, government and science. Two of the most important business areas are finance, in particular in banks and insurance companies, and e-business, such as web portals, e-commerce and ad management services.In...
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box
Stealing the Network: How to Own the Box is a unique book in the fiction department.
It combines stories that are fictional with technology that is real.While
none of these specific events have happened, there is no reason why they could
not.You could argue it provides a roadmap for criminal hackers, but I say it does
something
...
Game Engine Toolset Development
Game Engine Toolset Development
Toolset development is an extremely broad topic. Game Engine Toolset Development provides you with a core set of skills and a comprehensive insight that will aid you in the development of game engine utilities, significantly reducing the time period associated with the construction phase of a project. The book starts off with topics regarding...
Agent-Based Hybrid Intelligent Systems
Agent-Based Hybrid Intelligent Systems
Many complex problems, such as financial investment planning, involve many different components or sub-tasks, each of which requires different types of processing. To solve such complex problems, a great diversity of intelligent techniques, including traditional hard computing techniques (e.g., expert systems) and soft computing techniques (e.g.,...
unlimited object storage image
Result Page: 370 369 368 367 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy