Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IBM Sametime 8.5.2 Administration Guide
IBM Sametime 8.5.2 Administration Guide
Allow me to be the first to congratulate you for purchasing this book. Sametime 8.5 is a very different product from previous versions of the product. What once was a simple offering that provided secure instant messaging with some web conferencing capabilities has now evolved into a robust, flexible, sophisticated communications...
Robustness Development and Reliability Growth: Value Adding Strategies for New Products and Processes
Robustness Development and Reliability Growth: Value Adding Strategies for New Products and Processes

This book integrates key tools and processes into a comprehensive program for developing more robust and reliable technology-based products. Drawing on their extensive product development experience, the authors present a complete process for ensuring product performance throughout the entire lifecycle, from understanding...

Beginning EJB 3 Application Development: From Novice to Professional
Beginning EJB 3 Application Development: From Novice to Professional

EJB 3.0 has made huge advances in ease of development, and its drastically simplified programming model has been widely acclaimed. Targeted at Java and J2EE developers both with and without prior EJB experience, Beginning EJB 3 Application Development takes readers through the details of the EJB 3.0 architecture, and shows how EJB can...

Five Stars: Putting Online Reviews to Work for Your Business
Five Stars: Putting Online Reviews to Work for Your Business

Create positive visibility for your business with this essential roadmap

Everyone now understands the importance of online reviews on sites such as Yelp. This unique book helps you influence the process and leverage the results to increase sales and revenue. Five Stars is the perfect guide to a timely and crucial...

Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
Early in 2020, the world began suffering from a viral pandemic known as COVID-19. The world shut down, and people were ordered to shelter in place in their homes. Many jobs were lost or furloughed until the quarantine was lifted, but many employers were able to transition to a “work from home” structure. Internet...
The Art of Agile Development
The Art of Agile Development

The Art of Agile Development contains practical guidance for anyone considering or applying agile development for building valuable software. Plenty of books describe what agile development is or why it helps software projects succeed, but very few combine information for developers, managers, testers, and customers into a single...

Software Fortresses: Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures

This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed...

.NET Framework Security
.NET Framework Security
Welcome! The book you hold in your hands is a comprehensive guide and roadmap to the security infrastructure of the Microsoft .NET Framework. The .NET Framework is Microsoft's new cross-language development environment for building rich client applications and XML Web Services. One of the key features of the .NET Framework is a robust security...
Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks

Cognitive networks can dynamically adapt their operational parameters in response to user needs or changing environmental conditions. They can learn from these adaptations and exploit knowledge to make future decisions.

Cognitive networks are the future, and they are needed simply because they enable users to focus on things other...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Handbook of Anticancer Pharmacokinetics and Pharmacodynamics (Cancer Drug Discovery and Development)
Handbook of Anticancer Pharmacokinetics and Pharmacodynamics (Cancer Drug Discovery and Development)

Leading investigators synthesize the entire laboratory and clinical process of developing anticancer drugs to create a single indispensable reference that covers all the steps from the identification of cancer-specific targets to phase III clinical trials. These expert authors provide their best guidance on a wide variety of issues, including...

Tax Insight: For Tax Year 2013 and Beyond
Tax Insight: For Tax Year 2013 and Beyond

Tax Insight: For Tax Year 2013 and Beyond will teach you to take control of life’s biggest expense—taxes. In your lifetime, you will spend more money on taxes than on anything else. Despite that fact, you likely know the current prices of movies and milk but don’t know what your marginal tax rate is. You know where...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy