Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Project Estimation: Intelligent Forecasting, Project Control, and Client Relationship Management
Software Project Estimation: Intelligent Forecasting, Project Control, and Client Relationship Management
Have you been on projects where halfway down the road it seems increasingly unlikely that you will finish as desired, but you can’t put your finger on it and simply push through with a growing resentment? Have you been in meetings where scope discussions get increasingly difficult and depressing, ultimately sucking the...
Talking to Strangers
Talking to Strangers

Talking to Strangers is a freshly curated collection of prose, spanning fifty years of work and including famous as well as never-before-published early writings, from 2018 Man Booker Prize–finalist Paul Auster.

Beginning with a short philosophical meditation written when he was twenty and
...

Advanced PHP for Flash
Advanced PHP for Flash

Advanced PHP for Flash is the follow-up to the hugely popular Foundation PHP for Flash.

The main aim of this book is to extend the reader's knowledge of using PHP and MySQL to produce dynamic content for Flash. Essentially, it picks up the baton from the first book and runs with it until there's no more...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Success Habits For Dummies
Success Habits For Dummies

Discover the ultimate success habits for a healthy and prosperous life

Whether we like it or not, a big part of what we do in life is governed by habits. Even more importantly, habits can lead us to think and feel in certain patterns. Since habits are so powerful, it's worth paying attention to the ones that...

Becoming a Strategic Leader: Your Role in Your Organization's Enduring Success (J-B CCL (Center for Creative Leadership))
Becoming a Strategic Leader: Your Role in Your Organization's Enduring Success (J-B CCL (Center for Creative Leadership))
Praise for Becoming a Strategic Leader

"If you manage anything of importance—from a company to a functional area—read this book, and share it with your team. You'll dog-ear plenty of pages and blow away your previous performance."
—Steve Wigginton, executive vice president,
...

IPv6 Network Administration
IPv6 Network Administration
This essential guide explains what works, what doesn't, and most of all, what's practical about IPv6--the next-generation Internet standard. A must-have for network administrators everywhere looking to fix their network's scalability and management problems. Also covers other IPv6 benefits, such as routing, integrated auto-configuration,...
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity

Become an Ethereum Blockchain developer using a blend of concepts and hands-on implementations

Key Features

  • Understand the Ethereum Ecosystem and its differences from its rich cousin Bitcoin
  • Explore the Solidity programming language and smart contract optimizations
  • ...
Wireless Data Demystified (Mcgraw-Hill Demystified Series)
Wireless Data Demystified (Mcgraw-Hill Demystified Series)
UNDERSTAND WIRELESS DATA COMPLETELY, EASILY WITH WIRELESS DATA DEMYSTIFIED

Wireless subscribers are up, but revenue per subscriber isn’t – and it isn’t going to be unless wireless service providers can provide more than plain-vanilla voice services. The road to successful deployment of data services...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Upgrading and Repairing Laptop Computers
Upgrading and Repairing Laptop Computers
Beyond cutting edge, Scott Mueller goes where no computer book author has gone before--right past all the warranty stickers, the hidden screws, and the fear factor to produce a real owner's manual that every laptop owner should have on his desk. This book shows the upgrades users can perform, the ones that are better left to the manufacturer,...
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy