 |
|
|
|
|
 PMP Project Management Professional Study Guide (Certification Press)This book shows you not only what, but how to study for the PMP exam. With 100% complete coverage of all exam objectives and simulated questions, this guide covers project initiation, scope management, quality assurance, and more.
Get the book that shows you not only what—but how—to study ... |  |  Python for Finance: Mastering Data-Driven Finance
The financial industry has recently adopted Python at a tremendous rate, with some of the largest investment banks and hedge funds using it to build core trading and risk management systems. Updated for Python 3, the second edition of this hands on book helps you get started with the language, guiding developers and... |  |  Applying Design for Six Sigma to Software and Hardware Systems
The Practical, Example-Rich Guide to Building Better Systems, Software, and Hardware with DFSS
Design for Six Sigma (DFSS) offers engineers powerful opportunities to develop more successful systems, software, hardware, and processes. In Applying Design for Six Sigma to Software and Hardware Systems, two... |
|
 Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)You own your own business. You have also created a website for your business that details the products or services that you offer, but it doesn't allow potential customers to purchase anything online. Don't risk losing business-learn to create a dynamic online environment using only three programs. PHP, MySQL and Apache are three popular... |  |  Refactoring Databases : Evolutionary Database DesignRefactoring has proven its value in a wide range of development projectshelping software professionals improve system designs, maintainability, extensibility, and performance. Now, for the first time, leading agile methodologist Scott Ambler and renowned consultant Pramodkumar Sadalage introduce powerful refactoring techniques... |  |  Privacy and Security for Cloud Computing (Computer Communications and Networks)
This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic... |
|
|
|
Result Page: 97 96 95 94 93 92 91 90 89 88 |