Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL The Complete Reference, 3rd Edition
SQL The Complete Reference, 3rd Edition

Get comprehensive coverage of every aspect of SQL from three leading industry experts. Revised with coverage of the latest RDBMS software versions, this one-stop guide explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications. 

SQL: The Complete Reference, Third...

Test-Driven JavaScript Development (Developer's Library)
Test-Driven JavaScript Development (Developer's Library)

For JavaScript developers working on increasingly large and complex projects, effective automated testing is crucial to success. Test-Driven JavaScript Development is a complete, best-practice guide to agile JavaScript testing and quality assurance with the test-driven development (TDD) methodology. Leading agile JavaScript...

R Machine Learning By Example
R Machine Learning By Example

Understand the fundamentals of machine learning with R and build your own dynamic algorithms to tackle complicated real-world problems successfully

About This Book

  • Get to grips with the concepts of machine learning through exciting real-world examples
  • Visualize and solve complex problems...
Core JSP
Core JSP

In recent years, a large amount of software development activity has migrated from the client to the server. The client-centric model, in which a client executes complex programs to visualize and manipulate data, is no longer considered appropriate for the majority of enterprise applications. The principal reason is deployment—it is a...

Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Reliable Knowledge Discovery
Reliable Knowledge Discovery
With the rapid development of the data mining and knowledge discovery, a key issue which could significantly affect the real world applications of data mining is the reliability issues of knowledge discovery. It is natural that people will ask if the discovered knowledge is reliable. Why do we trust the discovered knowledge? How...
Humanitarian and Relief Logistics: Research Issues, Case Studies and Future Trends
Humanitarian and Relief Logistics: Research Issues, Case Studies and Future Trends

This edited volume highlights recent research advances in humanitarian relief logistics. The contributed chapters span the spectrum of key issues and activities from preparedness to mitigation operations (response), planning and execution. The volume also presents state-of-the-art methods and systems through current case studies.

...

Computing with Memory for Energy-Efficient Robust Systems
Computing with Memory for Energy-Efficient Robust Systems

This book analyzes energy and reliability as major challenges faced by designers of computing frameworks in the nanometer technology regime.  The authors describe the existing solutions to address these challenges and then reveal a new reconfigurable computing platform, which leverages high-density nanoscale memory for both data storage...

Test-Driven Java Development - Second Edition: Invoke TDD principles for end-to-end application development
Test-Driven Java Development - Second Edition: Invoke TDD principles for end-to-end application development

This book will teach the concepts of test driven development in Java so you can build clean, maintainable and robust code

Key Features

  • Explore the most popular TDD tools and frameworks and become more proficient in building applications
  • Create applications with better code...
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Advanced Error Control Techniques for Data Storage Systems
Advanced Error Control Techniques for Data Storage Systems
With the massive amount of data produced and stored each year, reliable storage and retrieval of information is more crucial than ever. Robust coding and decoding techniques are critical for correcting errors and maintaining data integrity. Comprising chapters thoughtfully selected from the highly popular Coding and Signal Processing for Magnetic...
Cocos2d for iPhone 1 Game Development Cookbook
Cocos2d for iPhone 1 Game Development Cookbook
Cocos2d for iPhone is a robust but simple to use 2D game framework for iPhone. It is fast, flexible, free, and App Store approved. More than 2500 App Store games already use it, including many best-selling games. Do you want to take your Cocos2d game development skills to the next level and become more professional in Cocos2d game design?...
unlimited object storage image
Result Page: 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy