Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building and Managing Enterprise-Wide Portals
Building and Managing Enterprise-Wide Portals
Inspired by similar questions, we decided to put together a systematic review of current Web technology and trends to meet two goals:
  1. Provide information to people who need general, rather than in depth, technical knowledge such as information technology (IT) development mangers, software designers, architects, IT students, and...
Data Mining Methods and Models
Data Mining Methods and Models
Apply powerful Data Mining Methods and Models to Leverage your Data for Actionable Results

Data Mining Methods and Models provides:

  • The latest techniques for uncovering hidden nuggets of information
  • The insight into how the data mining algorithms actually work
  • The hands-on experience of...
IBM EServer Certification Study Guide - Pseries Aix System Support
IBM EServer Certification Study Guide - Pseries Aix System Support
This redbook is designed as a study guide for professionals wishing to prepare for the certification exam to achieve: IBM eserver Certified Specialist - pSeries AIX System Support. The system support certification validates a broad scope of AIX problem determination and resolution skills and the ability to perform general AIX software system...
Create Your Own DVDs
Create Your Own DVDs
I set out to write this book for one simple reason: I want you to have fun making your own movies with your camcorder and your PC. I want to help you get up to speed so that you can easily create movies that your friends and family will actually watch.

Although the title of this book might suggest that it is strictly for people who want
...
How Not to Program in C++: 111 Broken Programs and 3 Working Ones, or Why Does 2+2=5986
How Not to Program in C++: 111 Broken Programs and 3 Working Ones, or Why Does 2+2=5986
". . . a unique book that is fun to read while still providing valuable information." -- CodeGuru.com

". . .[like] cross training with the drill sergeant of debugging. . ." -- Chris Pelsor, Flash Developer

"If you have been programming in C++ for a while, this book is and excellent
...
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010

The present volume contains the proceedings of the seventh international workshop on Formal Aspects of Security and Trust (FAST 2010), held in Pisa, Italy, 16–17 September 2010, as part of the 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2010).

FAST aims to foster cooperation among...

Human Machine Interaction: Research Results of the MMI Program
Human Machine Interaction: Research Results of the MMI Program

Human Machine Interaction, or more commonly Human Computer Interaction, is the study of interaction between people and computers. It is an interdisciplinary field, connecting computer science with many other disciplines such as psychology, sociology and the arts.

The present volume documents the results of the MMI research program...

Java Software Solutions (8th Edition)
Java Software Solutions (8th Edition)

Note: You are purchasing a standalone product; MyProgrammingLab does not come packaged with this content. If you would like to purchase both the physical text and MyProgrammingLab  search for ISBN-10: 0133796280/ISBN-13: 9780133796285. That package includes ISBN-10: 0133594955/ISBN-13: 9780133594959 and...

Dreamweaver MX Extensions
Dreamweaver MX Extensions

Do you use Dreamweaver? Have you downloaded and installed extensions from the Dreamweaver Exchange, and do you love the whole idea of being able to add objects, behaviors, commands, and so forth, to the program? Do you often find yourself thinking, "If only Dreamweaver did it this way..." or "Why doesn't someone...

Managing Projects in Organizations : How to Make the Best Use of Time, Techniques, and People
Managing Projects in Organizations : How to Make the Best Use of Time, Techniques, and People
Your Handbook for Managing Projects

In this third edition of Managing Projects in Organizations, J. Davidson Frame updates and expands on his classic book to provide an accessible introduction to the field of project management. Drawing on more than twenty-five years of consulting and training experience, Frame’s most current edition of...

IBM Certification Study Guide AIX Installation and System Recovery
IBM Certification Study Guide AIX Installation and System Recovery
The AIX and RS/6000 Certifications, offered through the Professional Certification Program from IBM, are designed to validate the skills required of technical professionals who work in the powerful, and often complex, environments of the AIX operating system and RS/6000 and pSeries servers. A complete set of professional certifications are...
unlimited object storage image
Result Page: 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy