Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Extraction in the Web Era: Natural Language Communication for Knowledge Acquisition and Intelligent Information Agents
Information Extraction in the Web Era: Natural Language Communication for Knowledge Acquisition and Intelligent Information Agents

The number of research topics covered in recent approaches to Information Extraction (IE) is continually growing as new facts are being considered. In fact, while the user’s interest in extracting information from texts deals mainly with the success of the entire process of locating, in document collections, facts of interest,...

Do more with SOA Integration: Best of Packt
Do more with SOA Integration: Best of Packt
A Packt Compendium is a book formed by drawing existing content from several related Packt titles. In other words, it is a mash-up of published Packt content – Professional Expertise Distilled in the true sense. Such a compendium of Packt's content allows you to learn from each of the chapters' unique styles and Packt does its...
The Adobe Photoshop Layers Book
The Adobe Photoshop Layers Book
Any time you try to develop a skill, you want to make sure that you take advantage of the basic tools of the trade. If you were a bus driver, you would want to be sure you knew how to use the key, gas pedal, brake pedal, clutch, shift-stick, turn signals, and steering wheel, and where the gas goes to be sure you were going to...
Oracle E-Business Suite R12 Core Development and Extension Cookbook
Oracle E-Business Suite R12 Core Development and Extension Cookbook
This book is about extending Oracle E-Business Suite (EBS). Throughout the book there are detailed examples to work through with tips and explanations about how various components are configured and how we can extend standard functionality. The book is aimed at developers who are new to E-Business Suite or those who are strong in...
Microsoft Application Virtualization Advanced Guide
Microsoft Application Virtualization Advanced Guide
Microsoft's Application Virtualization technology has been emerging as one of the main platforms in application virtualization. This is mainly because more and more organizations are thinking about application virtualization as a valid implementation and also because App-V probably represents the most attractive solution. App-V introduces...
Working with Microsoft FAST Search Server 2010 for SharePoint
Working with Microsoft FAST Search Server 2010 for SharePoint
Should you care about search? The answer is “Yes!” However, the reason you should care constantly changes. Back in 1997 when FAST was founded, most people viewed search as a mature and commoditized technology. AltaVista was the leader in web search and Verity had won the enterprise search race. Internet...
Pro SQL Server 2012 Integration Services (Professional Apress)
Pro SQL Server 2012 Integration Services (Professional Apress)

Pro SQL Server 2012 Integration Services teaches how to take advantage of the powerful extract, transform, and load (ETL) platform included with Microsoft SQL Server 2012. You’ll learn to build scalable, robust, performance-driven enterprise ETL solutions that save time and make money for your company. You'll learn to...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Visual Models for Software Requirements (Best Practices (Microsoft))
Visual Models for Software Requirements (Best Practices (Microsoft))
Visual requirements models are one of the most effective ways to identify software requirements. They help the analyst to ensure that all stakeholders—including subject matter experts, business stakeholders, executives, and technical teams—understand the proposed solution. Visualization keeps...
AAA Identity Management Security (Networking Technology: Security)
AAA Identity Management Security (Networking Technology: Security)

This book is focused on providing the skills necessary to successfully configure authentication, authorization, and accounting (AAA) services on Cisco devices using Cisco Secure Access Control Server/System 4.2 and 5.1. This book was motivated by a desire to provide a one-stop resource for AAA solutions on Cisco...

Mastering SAP NetWeaver PI - Administration
Mastering SAP NetWeaver PI - Administration

As the core middleware in your system landscape, SAP NetWeaver PI plays an enterprise-critical role. But how can you ensure smooth operation? This book answers your questions. Using a highly detailed scenario as an example, the authors guide you through all administration tasks and provide useful tips for your daily work.

...

IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board’s audit committee and CEO. Written as a contribution to the accounting and auditing...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy