Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SignalR Real-time Application Cookbook
SignalR Real-time Application Cookbook

Use SignalR to create real-time, bidirectional, and asynchronous applications based on standard web technologies

Overview

  • Build high performance real-time web applications.
  • Broadcast messages from the server to many clients simultaneously.
  • Implement complex and reactive...
Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models
Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models

Explore and master the most important algorithms for solving complex machine learning problems.

Key Features

  • Discover high-performing machine learning algorithms and understand how they work in depth
  • One-stop solution to mastering supervised, unsupervised, and...
Implementing Sugarcrm: A Step-by-step Guide to Using This Powerful Open Source Application in Your Business
Implementing Sugarcrm: A Step-by-step Guide to Using This Powerful Open Source Application in Your Business
Here are just some of the knowledge and skills you will gain when you read this book:

* Learn specific ways in which SugarCRM can increase your profits through richer customer relationships

* The author will help you assess your own companies needs, and plan a SugarCRM implementation tailored specifically to you –...

Software Fortresses: Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures

This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed...

.NET Framework Security
.NET Framework Security
Welcome! The book you hold in your hands is a comprehensive guide and roadmap to the security infrastructure of the Microsoft .NET Framework. The .NET Framework is Microsoft's new cross-language development environment for building rich client applications and XML Web Services. One of the key features of the .NET Framework is a robust security...
Excel 2007 Workbook For Dummies (Computer/Tech)
Excel 2007 Workbook For Dummies (Computer/Tech)
From formulas to functions to the latest features — practice and plan Excel tasks with ease

Confused by Excel? Want to make the most of its capabilities? No worries — this hands-on workbook gets you up to speed in a step-by-step manner. From navigating the new user interface and creating your first spreadsheet to using formulas,...

Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Learn the differences between various log aggregation and correlation systems
  • Examine regulatory and industry requirements
  • Evaluate various deployment scenarios
  • Properly size your deployment
  • Protect the Cisco Security MARS appliance from attack
  • Generate reports,...
Agility by ARIS Business Process Management: Yearbook Business Process Excellence 2006/2007
Agility by ARIS Business Process Management: Yearbook Business Process Excellence 2006/2007
Agility and Execution – Organizational Success Through Flexible Business Processes

Only a company which is flexible, agile and responsive will be successful. The secret to success is agility, meaning the ability to quickly adapt company processes. Against this backdrop, IT is of particular importance as it is virtually the machine
...
Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0
Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0
Giving a sound technical introduction to 3GPP LTE and SAE, this book explains the decisions taken during standardization while also examining the likely competition for LTE such as HSPA+ and WiMAX. As well as looking at next generation network technologies, Beyond 3G - Bringing Networks, Terminals and the Web Together describes the latest...
Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011
Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011

FASE (Fundamental Approaches to Software Engineering) is concerned with the foundations on which software engineering is built. Its focus is on novel techniques and the way in which they contribute to making software engineering a more mature and soundly based discipline. This year, we particularly encouraged contributions that combine the...

Jitter, Noise, and Signal Integrity at High-Speed
Jitter, Noise, and Signal Integrity at High-Speed

State-of-the-art JNB and SI Problem-Solving: Theory, Analysis, Methods, and Applications

 

Jitter, noise, and bit error (JNB) and signal integrity (SI) have become today‘s greatest challenges in high-speed digital design. Now, there’s a...

4G: Deployment Strategies and Operational Implications
4G: Deployment Strategies and Operational Implications

Specific operational requirements drive early network architectural and design decisions for 4G networks. 4G: Deployment Strategies and Operational Implications evaluates the specific design and deployment options and strategies for LTE network business development. LTE is a...

unlimited object storage image
Result Page: 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy