Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Electrical Energy Efficiency: Technologies and Applications
Electrical Energy Efficiency: Technologies and Applications

The improvement of electrical energy efficiency is fast becomingone of the most essential areas of sustainability development,backed by political initiatives to control and reduce energydemand.

Now a major topic in industry and the electrical engineeringresearch community, engineers have started to focus on analysis,diagnosis and...

Spring Data
Spring Data

Want to make it easier to implement data access with your Spring-powered applications? Then this is the book you need. A complete tutorial to Spring Data, it makes learning easier with lots of code examples and clear instructions.

Overview

  • Implement JPA repositories with lesser code
  • ...
Improving Web Application Security: Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures

This guide helps you to design, build, and configure hack-resilient Web applications. These are applications that reduce the likelihood of successful attacks and mitigate the extent of damage should an attack occur. This guide uses a three-layered approach: securing the network, securing the host, and securing the application. This guide...

A Networking Approach to Grid Computing
A Networking Approach to Grid Computing
In February 1974 this author, as a math major at the Polytechnic Institute of Brooklyn,
(co)invented a now well-rooted but computationally complex concept of “hyperperfect
numbers” and he used an early form of grid computing—also known as
utility computing—to study this concept (see pages 83 and 86). His
...
Grails 1.1 Web Application Development
Grails 1.1 Web Application Development
Web development is tricky--even a simple web application has a number of context changes ready to trip up the unwary. Grails takes the everyday pain out of web application development, allowing us to focus on delivering real application logic and create seamless experiences that will address the needs of our users. This book will take the pain out...
Practical Google Analytics and Google Tag Manager for Developers
Practical Google Analytics and Google Tag Manager for Developers

Whether you’re a marketer with development skills or a full-on web developer/analyst, Practical Google Analytics and Google Tag Manager for Developers shows you how to implement Google Analytics using Google Tag Manager to jumpstart your web analytics measurement.

There’s a reason that so many...

PolyBase Revealed: Data Virtualization with SQL Server, Hadoop, Apache Spark, and Beyond
PolyBase Revealed: Data Virtualization with SQL Server, Hadoop, Apache Spark, and Beyond

Harness the power of PolyBase data virtualization software to make data from a variety of sources easily accessible through SQL queries while using the T-SQL skills you already know and have mastered.

PolyBase Revealed shows you how to use the PolyBase feature of SQL Server 2019 to...

Agility and Discipline Made Easy: Practices from OpenUP and RUP (Addison-Wesley Object Technology)
Agility and Discipline Made Easy: Practices from OpenUP and RUP (Addison-Wesley Object Technology)
In Agility and Discipline Made Easy, Rational Unified Process (RUP) and Open Unified Process (OpenUP) experts Per Kroll and Bruce MacIsaac share twenty well-defined best practices that you and your team can start adopting today to improve the agility, predictability, speed, and cost of software development.

Kroll and...

Firewall Policies and VPN Configurations
Firewall Policies and VPN Configurations
Deploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will...
JasperReports 3.5 for Java Developers
JasperReports 3.5 for Java Developers
Do you want to create easily understood, professional, and powerful reports from disordered, scattered data using a free, open source Java class library? If your answer is yes, this book on JasperReports is what you are looking for. JasperReports is the world's most popular embeddable Java open source reporting library, providing Java developers...
Wireless Mobility: The Why of Wireless (Networking Professional's Library)
Wireless Mobility: The Why of Wireless (Networking Professional's Library)

Comprehensive Answers to the "Why" of Wireless Mobility

In this unique guide, Cisco wireless expert Neil Reid incorporates best practices from some of the most complex and challenging wireless deployments in the industry and provides an insider's view of the "why" of wireless mobility. The book discusses...

Asymmetric Passive Components in Microwave Integrated Circuits (Wiley Series in Microwave and Optical Engineering)
Asymmetric Passive Components in Microwave Integrated Circuits (Wiley Series in Microwave and Optical Engineering)

This book examines the new and important technology of asymmetric passive components for miniaturized microwave passive circuits. The asymmetric design methods and ideas set forth by the author are groundbreaking and have not been treated in previous works. Readers discover how these design methods reduce the circuit size of microwave...

unlimited object storage image
Result Page: 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy