Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scaling Your Startup: Mastering the Four Stages from Idea to $10 Billion
Scaling Your Startup: Mastering the Four Stages from Idea to $10 Billion
Know how your company can accelerate growth by not only tapping into new growth vectors, but also by adapting its organization, culture, and processes.

To oversee growth from an idea to a company with billions in revenue, CEOs must reinvent many aspects of their company in anticipation of it reaching ever-higher revenues.
...
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL
React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL

Over 66 hands-on recipes that cover UI development, animations, component architecture, routing, databases, testing, and debugging with React

Key Features

  • Use essential hacks and simple techniques to solve React application development challenges
  • Create native mobile...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

The Mac OS X Lion Project Book
The Mac OS X Lion Project Book

Managing files and finding stuff after you’ve organized it are things you’ll know about after reading this chapter. The chapter also covers loading up on applications, both from the App Store and directly from developers’ Web sites. (If you’re not sure now what the differences are, don’t...

JavaScript Projects for Kids
JavaScript Projects for Kids

Key Features

  • Get to know the concepts of HTML and CSS to work with JavaScript
  • Explore the concepts of object-oriented programming
  • Follow this step-by-step guide on the fundamentals of JavaScript programming

Book Description

JavaScript is the most widely-used...

The Haskell Road to Logic, Maths and Programming (Texts in Computing S.)
The Haskell Road to Logic, Maths and Programming (Texts in Computing S.)
Long ago, when Alexander the Great asked the mathematician Menaechmus for a crash course in geometry, he got the famous reply “There is no royal road to mathematics.” Where there was no shortcut for Alexander, there is no shortcut for us. Still, the fact that we have access to computers and mature programming languages means that there...
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift—intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development...
Practical IPv6 for Windows Administrators
Practical IPv6 for Windows Administrators

Practical IPv6 for Windows Administrators is a handy guide to implementing IPv6 in a Microsoft Windows environment. This is the book you need if you are a Microsoft Windows Administrator confronted with IPv6 and in need of a quick resource to get up and going. The book covers the current state of IPv6 and its support in Microsoft...

Dynamic Vision for Perception and Control of Motion
Dynamic Vision for Perception and Control of Motion
The application of machine vision to autonomous vehicles is an increasingly important area of research with exciting applications in industry, defense, and transportation likely in coming decades.

Dynamic Vision for Perception and Control of Road Vehicles has been written by the world's leading expert on autonomous road-following...

Java 8 Pocket Guide
Java 8 Pocket Guide

When you need quick answers for developing or debugging Java programs, this pocket guide provides a handy reference to standard features of the Java programming language and its platform. You’ll find helpful programming examples, tables, figures, and lists, as well as Java 8 features such as Lambda Expressions and the Date and...

Result Page: 35 34 33 32 31 30 29 28 27 26 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy