Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Node.js in Action
Node.js in Action

Summary

Node.js in Action is an example-driven tutorial that starts at square one and guides you through all the features, techniques, and concepts you'll need to build production-quality Node applications. You'll start by learning how to set up your Node development environment, including loading...

Risk Management and Capital Adequacy
Risk Management and Capital Adequacy

A Step-by-Step Approach for Integrating Market, Credit, and Operational Risk Management--While Complying with New Basel Accord Guidelines

For financial institutions around the world, the work involved in managing market, credit, and operational risk exposures--as well as the capital required to support such...

Penetration Tester's Open Source Toolkit, Third Edition
Penetration Tester's Open Source Toolkit, Third Edition

Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it’s often hard to ensure that you know what tools are available and which ones to use for a certain task....

Web Engineering: Principles and Techniques
Web Engineering: Principles and Techniques
Since the advent of the Web, every aspect of our lives and organizational activities has changed dramatically. Organizations’ expectations and dependencies on the use of Web technologies have increased rapidly over the years. Most organizations have conceived these Web technologies as a critical instrument for enhancing their performance;...
Information Theory and Reliable Communication
Information Theory and Reliable Communication
This book is designed primarily for use as a first-year graduate text in information theory, suitable for both engineers and mathematicians. It is assumed that the reader has some understanding of freshman calculus and elementary probability, and in the later chapters some introductory random process theory. Unfortunately there is one more...
Build Android-Based Smart Applications: Using Rules Engines, NLP and Automation Frameworks
Build Android-Based Smart Applications: Using Rules Engines, NLP and Automation Frameworks
Build smart applications using cutting-edge technologies such as rules engines, code automation frameworks, and natural language processing (NLP). This book provides step-by-step instructions on how to port nine rules engines (CLIPS, JRuleEngine, DTRules, Zilonis, TermWare, Roolie, OpenRules, JxBRE, and JEOPS) to the Android...
Data Mining on Multimedia Data (Lecture Notes in Computer Science)
Data Mining on Multimedia Data (Lecture Notes in Computer Science)

The increasing use of computer technology in many areas of economic, scientific, and social life is resulting in large collections of digital data. The amount of data which is created on and stored in computers is growing from day to day. Electronic database facilities are common everywhere and can now be considered a standard technology....

UMTS Network Planning, Optimization, and Inter-Operation with GSM
UMTS Network Planning, Optimization, and Inter-Operation with GSM

The continuing explosive growth in mobile communication is demanding more spectrally efficient radio access technologies than the prevalent second generation (2G) systems such as GSM to handle just the voice traffic. We are already witnessing high levels of mobile penetration exceeding 70% in some countries. It is anticipated that by...

Fuel Cell Electronics Packaging
Fuel Cell Electronics Packaging

Today's commercial, medical and military electronics are becoming smaller and smaller. At the same time, these devices are packed with more functions and demand more power. This power requirement is currently met almost exclusively by battery power. A fuel cell is like a battery converting chemical energy directly to electricity. The...

Requirements Management Using IBM(R) Rational(R) RequisitePro(R)
Requirements Management Using IBM(R) Rational(R) RequisitePro(R)
Optimize Your Entire Requirements Process–and Use Requirements to Build More Successful Software

 

Using IBM® Rational® RequisitePro®, you can systematically improve the way you create and maintain requirements–and use those requirements to build...

BDD in Action: Behavior-driven development for the whole software lifecycle
BDD in Action: Behavior-driven development for the whole software lifecycle

Summary

BDD in Action teaches you the Behavior-Driven Development model and shows you how to integrate it into your existing development process. First you'll learn how to apply BDD to requirements analysis to define features that focus your development efforts on underlying business goals. Then,...

Google Visualization API Essentials
Google Visualization API Essentials

Make sense of your data: make it visual with the Google Visualization API

Overview

  • Wrangle all sorts of data into a visual format, without being an expert programmer.
  • Visualize new or existing spreadsheet data through charts, graphs, and maps.
  • Full of diagrams, core concept...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy