Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ASP.NET by Example
ASP.NET by Example
ASP developers need to understand how ASP.NET can help them solve business problems better than any prior product. ASP.NET by Example is designed to provide a "crash course" on ASP.NET and quickly help the reader start using this new technology. As part of the By Example series, this book approaches ASP.NET in an easy-to-use tutorial...
Advances In Quantitative Analysis Of Finance And Accounting
Advances In Quantitative Analysis Of Finance And Accounting
Advances in Quantitative Analysis of Finance and Accounting is an annual publication designed to disseminate developments in the quantitative analysis of finance and accounting. The publication is a forum for statistical and quantitative analyses of issues in finance and accounting, as well as applications of quantitative methods to problems in...
Building Web Reputation Systems
Building Web Reputation Systems

Today’s Web is the product of over a billion hands and minds. Around the clock and around the globe, people are pumping out contributions small and large: full-length features on Vimeo, video shorts on YouTube, comments on Blogger, discussions on Yahoo! Groups, and tagged-and-titled Del.icio.us bookmarks. User-generated content...

Algorithms for Discrete Fourier Transform and Convolution (Signal Processing and Digital Filtering)
Algorithms for Discrete Fourier Transform and Convolution (Signal Processing and Digital Filtering)

The main goal of this graduate-level text is to provide a language for understanding, unifying, and implementing a wide variety of algorithms for digital signal processing -- in particular, to provide rules and procedures that can simplify or even automate the task of writing code for the newest parallel and vector machines. It thus bridges...

Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

Professional Microsoft SQL Server 2012 Analysis Services with MDX and DAX (Wrox Programmer to Programmer)
Professional Microsoft SQL Server 2012 Analysis Services with MDX and DAX (Wrox Programmer to Programmer)

Understand Microsoft's dramatically updated new release of its premier toolset for business intelligence

The first major update to Microsoft's state-of-the-art, complex toolset for business intelligence (BI) in years is now available and what better way to master it than with this detailed book from key members of...

Functional Analysis Methods for Reliability Models (Pseudo-Differential Operators)
Functional Analysis Methods for Reliability Models (Pseudo-Differential Operators)
People are often concerned with the reliability of products they use and of the friends and associates with whom they interact daily in a myriad of ways. Although the term “reliability” may not occur in the description of a given product or interaction, it is often the attribute that the individual means in expression of...
Creating Flat Design Websites
Creating Flat Design Websites

Design and develop your own flat design websites in HTML with this book and ebook

Overview

  • Learn what flat design is and how you can create your own flat design projects
  • Discover how to create flat designs without losing any functionality or ease of use.
  • Learn how to develop...
Marketing Management: Text and Cases
Marketing Management: Text and Cases

Step-by-step guidelines for successful marketing management!

Designed for college- and graduate-level marketing students, Marketing Management: Text and Cases is also a valuable resource for anyone trying to market a product or service. This volume integrates understandable marketing concepts and techniques with useful
...

JIRA 5.2 Essentials
JIRA 5.2 Essentials

Learn how to track bugs and issues, and manage your software development projects with JIRA

Overview

  • Learn how to set up JIRA for software development.
  • Effectively manage and handle software bugs and issues.
  • Includes updated JIRA content as well as coverage of the popular...
Java Software Solutions (8th Edition)
Java Software Solutions (8th Edition)

Note: You are purchasing a standalone product; MyProgrammingLab does not come packaged with this content. If you would like to purchase both the physical text and MyProgrammingLab  search for ISBN-10: 0133796280/ISBN-13: 9780133796285. That package includes ISBN-10: 0133594955/ISBN-13: 9780133594959 and...

Software Test Attacks to Break Mobile and Embedded Devices (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)
Software Test Attacks to Break Mobile and Embedded Devices (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)

Address Errors before Users Find Them
Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book
...

unlimited object storage image
Result Page: 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy