Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Chirality in Drug Research (Methods and Principles in Medicinal Chemistry)
Chirality in Drug Research (Methods and Principles in Medicinal Chemistry)

Divided into the three main sections of synthesis, analysis and drug development, this handbook covers all stages of the drug development process, including large-scale synthesis and purification of chirally pure pharmaceuticals.

The two editors from academia and a major pharmaceutical company have assembled an experienced,...

User-Centered Design: A Developer's Guide to Building User-Friendly Applications
User-Centered Design: A Developer's Guide to Building User-Friendly Applications

How do you design engaging applications that people love to use? This book demonstrates several ways to include valuable input from potential clients and customers throughout the process. With practical guidelines and insights from his own experience, author Travis Lowdermilk shows you how usability and user-centered design will...

PostgreSQL Server Programming
PostgreSQL Server Programming

Take your skills with PostgreSQL to a whole new level with this fascinating guide to server programming. A step by step approach with illuminating examples will educate you in the full range of possibilities.

Understand the extension framework of PostgreSQL, and leverage it in ways that you haven't even invented yet.

Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition

Delve into neural networks, implement deep learning algorithms, and explore layers of data abstraction with the help of TensorFlow.

Key Features

  • Learn how to implement advanced techniques in deep learning with Google's brainchild, TensorFlow
  • Explore deep neural...
Computer Vision – ECCV 2018 Workshops: Munich, Germany, September 8-14, 2018, Proceedings, Part III (Lecture Notes in Computer Science, 11131)
Computer Vision – ECCV 2018 Workshops: Munich, Germany, September 8-14, 2018, Proceedings, Part III (Lecture Notes in Computer Science, 11131)
The six-volume set comprising the LNCS volumes 11129-11134 constitutes the refereed proceedings of the workshops that took place in conjunction with the 15th European Conference on Computer Vision, ECCV 2018, held in Munich, Germany, in September 2018.

43 workshops from 74 workshops proposals were selected for
...
Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

Sarbanes-Oxley Guide for Finance and Information Technology Professionals
Sarbanes-Oxley Guide for Finance and Information Technology Professionals

Sarbanes-Oxley and its international variants are here to stay.

Are you prepared for this new business reality?

Changing the landscape of corporate governance, financial disclosure, and the practice of public accounting, the Sarbanes-Oxley Act (SOX) can be confusing and complex for professionals and executives who must take...

Programming Interviews Exposed: Secrets to Landing Your Next Job (Programmer to Programmer)
Programming Interviews Exposed: Secrets to Landing Your Next Job (Programmer to Programmer)

The pressure is on during the interview process but with the right preparation, you can walk away with your dream job. This classic book uncovers what interviews are really like at America's top software and computer companies and provides you with the tools to succeed in any situation. The authors take you step-by-step through new problems and...

IBM Xseries 455 Planning And Installation Guide
IBM Xseries 455 Planning And Installation Guide
The IBM eServer xSeries 455 is the second-generation Enterprise X-Architecture server using the 64-bit IBM XA-64 chipset and the Intel Itanium 2 processor. Unlike the x450, its predecessor, the x455 supports the merging of four server chassis to form a single 16-way image, providing even greater expandability and investment protection.
...
Groovy Recipes: Greasing the Wheels of Java (Pragmatic Programmers)
Groovy Recipes: Greasing the Wheels of Java (Pragmatic Programmers)
Each recipe in Groovy Recipes begins with a concise code example for a quick start, followed by in-depth explanation in plain English. These recipes will get you to-to-speed in a Groovy environment quickly.

You'll see how to speed up nearly every aspect of the development process using Groovy. Groovy makes mundane file management...

Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology
Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology
Driven by the need and desire to reduce costs, organizations are faced with a set of decisions that require analytical scrutiny. Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology examines cost-saving trends in architecture planning, administration, and management....
unlimited object storage image
Result Page: 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 384 383 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy