Home | Amazing | Today | Tags | Publishers | Years | Search 
Designing Interfaces
Designing Interfaces

Despite all of the UI toolkits available today, it's still not easy to design good application interfaces. This bestselling book is one of the few reliable sources to help you navigate through the maze of design options. By capturing UI best practices and reusable ideas as design patterns, Designing Interfaces provides...

Writing Fiction For Dummies
Writing Fiction For Dummies

5o, you want to write a novel? Great! Writing a novel Is a worthwhile goal. It'll challenge you, stretch you, and change you. Getting It published will gain you respect from your family and friends, and It may even earn you a bit of fame and money.

But respect, fame, and money aren't the only reasons for writing a...

Professional Plone 4 Development
Professional Plone 4 Development

I suspect Martin plied me to write this foreword while out one evening during the 2010 Plone Conference in Bristol. Full from an excellent dinner and even better conversation, beer in hand, who could say no?

I've long envied Martin's ability to write. Text and code flow from his fingers at a rate that I can't even begin...

Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop
Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop

Interest in and needs for provenance are growing as data proliferate. Data are increasing in a wide array of application areas, including scientific workflow systems, logical reasoning systems, text extraction, social media, and linked data. As data volumes expand and as applications become more hybrid and distributed in nature, there is...

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

Femtocells: Design & Application
Femtocells: Design & Application

As a cellular standard evolves, there are many variables that must be optimized. A few of these variables are directly related to higher throughput, increased user capacity, and in general improved system performance. The optimization techniques have involved higherorder modulation, improved multiple access (in both time and frequency), more...

Energy and Climate: How to achieve a successful energy transition
Energy and Climate: How to achieve a successful energy transition

Despite global concerns over dwindling resources, climate change and carbon dioxide emissions, fossil fuels still account for more than 80% of the world’s energy demands. As resources diminish and demand increases from rapidly developing nations such as China and India, the threat to both our environment and the security of our energy...

Pro PHP Application Performance: Tuning PHP Web Projects for Maximum Performance
Pro PHP Application Performance: Tuning PHP Web Projects for Maximum Performance

Pro PHP Application Performance will help you understand all the technologies and components which play a role in how well your applications run. When seconds can mean the difference between retaining a user and losing a user, it's important for all of us to have optimization as part of our project roadmap. But what components within your...

JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

Capitalism at the Crossroads: Next Generation Business Strategies for a Post-Crisis World (3rd Edition)
Capitalism at the Crossroads: Next Generation Business Strategies for a Post-Crisis World (3rd Edition)

“The central message of Stuart Hart’s book is that global business needs to be caring and be committed to preserving the globe’s ecological integrity. The ongoing economic slowdown brought about by rampant capitalism, the lessons from which this new edition of the book factors in, has only served to...

Applying Design for Six Sigma to Software and Hardware Systems
Applying Design for Six Sigma to Software and Hardware Systems

The Practical, Example-Rich Guide to Building Better Systems, Software, and Hardware with DFSS

Design for Six Sigma (DFSS) offers engineers powerful opportunities to develop more successful systems, software, hardware, and processes. In Applying Design for Six Sigma to Software and Hardware Systems, two
...

Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide
Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide

Massive, disruptive change is coming to IT as Software as a Service (SaaS), SOA, mashups, Web 2.0, and cloud computing truly come of age. Now, one of the world’s leading IT innovators explains what it all means—coherently, thoroughly, and authoritatively.

Writing for IT executives, architects, and developers
...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy