Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Complete Guide to Programming in C++
A Complete Guide to Programming in C++
This book provides both novice and experienced programmers with a comprehensive resource manual for the C++ programming language. Readers gain experience in all aspects of programming, from elementary language concepts to professional software development, with in depth coverage of all the language elements en route. These elements are carefully...
Enterprise Recipes with Ruby and Rails
Enterprise Recipes with Ruby and Rails
Enterprise Recipes with Ruby and Rails helps you to overcome typical obstacles hidden in every enterprise's infrastructure. It doesn't matter if your Rails application needs to access your company's message-oriented middleware or if it has to scan through tons of huge XML documents to get a missing piece of data. Ruby and Rails enable you...
Turbopumps and Pumping Systems
Turbopumps and Pumping Systems

This book covers most of the subjects that are requested by engineers, those who are directly involved in design and manufacturing the pumps to those who operate the pumps in industrial units. The authors have worked for many years teaching the subject, conducting research, and implementing pump and pump station designs in different academic...

The Art of Capacity Planning: Scaling Web Resources
The Art of Capacity Planning: Scaling Web Resources
Success on the web is measured by usage and growth. Web-based companies live or die by the ability to scale their infrastructure to accommodate increasing demand. This book is a hands-on and practical guide to planning for such growth, with many techniques and considerations to help you plan, deploy, and manage web application...
Fighting Computer Crime: A New Framework for Protecting Information
Fighting Computer Crime: A New Framework for Protecting Information

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during...

Post-mining of Association Rules: Techniques for Effective Knowledge Extraction
Post-mining of Association Rules: Techniques for Effective Knowledge Extraction

Since its introduction for market basket analysis in the early 1990s, association rule mining has had a lot of research attention, and it is now widely used in many fields, for example in retail, telecom, insurance, and bioinformatics applications.

One familiar problem encountered in association mining exercises is that they...

Web Services: A Manager's Guide
Web Services: A Manager's Guide

"This book performs a valuable service for managers seeking to harness the business potential of Web services technology. Bringing a real practitioner's experience to the task, Anne carefully walks managers through the fundamentals of Web services technology. She does a superb job of helping managers understand this technology so...

Scaling CouchDB
Scaling CouchDB

This practical guide offers a short course on scaling CouchDB to meet the capacity needs of your distributed application. Through a series of scenario-based examples, this book lets you explore several methods for creating a system that can accommodate growth and meet expected demand. In the process, you learn about several tools...

Knowledge Processing and Data Analysis: First International Conference, KONT 2007, Novosibirsk, Russia
Knowledge Processing and Data Analysis: First International Conference, KONT 2007, Novosibirsk, Russia

This volume collects the proceedings of two related international conferences on foundations and practical applications of mathematical methods of data analysis, of Formal Concept Analysis and of methods for information extraction from natural language texts. The first conference, named Knowledge - Ontology - Theory 2007 (KONT 2007),...

UMTS Network Planning, Optimization, and Inter-Operation with GSM
UMTS Network Planning, Optimization, and Inter-Operation with GSM

The continuing explosive growth in mobile communication is demanding more spectrally efficient radio access technologies than the prevalent second generation (2G) systems such as GSM to handle just the voice traffic. We are already witnessing high levels of mobile penetration exceeding 70% in some countries. It is anticipated that by...

Location-Based Information Systems: Developing Real-Time Tracking Applications
Location-Based Information Systems: Developing Real-Time Tracking Applications

Location-based services (LBS) are nally coming out of research labs and getting into the hands of nal users. It is fairly common to see cellular carriers and private companies o ering LBS to locate your children, friends, and sites of interest, track assets, enhance the security of key personnel, help people with disabilities use...

Adobe Flash Professional CS6 Classroom in a Book
Adobe Flash Professional CS6 Classroom in a Book

 

Adobe Flash Professional CS6 provides a comprehensive authoring environment for creating interactive and media-rich applications. Flash is widely used to create engaging projects integrating video, sound, graphics, and animation. You can create original content in Flash or import assets from other Adobe...

unlimited object storage image
Result Page: 885 884 883 882 881 880 879 878 877 876 875 874 873 872 871 870 869 868 867 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy