Home | Amazing | Today | Tags | Publishers | Years | Search 
The Red Gate Guide to SQL Server Team-based Development
The Red Gate Guide to SQL Server Team-based Development

Only small projects, relevant to very few people, are built by the sweat and toil of a lone developer. Larger projects, affecting whole organizations, will invariably require a team of people to design and develop the application and its storage layer, or database.

In some cases, this will mean some developers and one or two DBAs,...

Koha 3 Library Management System
Koha 3 Library Management System

Koha is the first full-featured open source library management system that is widely used for efficiently managing libraries. However, setting up and maintaining Koha is no walk in the park. It is not as straightforward as setting up the other popular LAMP applications.

This practical guide provides all the essential information...

Artificial Intelligence: A Modern Approach (3rd Edition)
Artificial Intelligence: A Modern Approach (3rd Edition)

Artificial Intelligence (AI) is a big field, and this is a big book. We have tried to explore the full breadth of the field, which encompasses logic, probability, and continuous mathematics; perception, reasoning, learning, and action; and everything from microelectronic devices to robotic planetary explorers. The book is...

Sams Teach Yourself Google Analytics in 10 Minutes
Sams Teach Yourself Google Analytics in 10 Minutes

Is your website performing as well as it should? Are you retaining visitors— or losing them too fast? Are you converting lookers to buyers—or are they bouncing from your site before they finish the checkout process? When you want to find out more about the people visiting your website, turn to Google Analytics. Google Analytics is...

Handbook of Digital and Multimedia Forensic Evidence
Handbook of Digital and Multimedia Forensic Evidence

In April 2005, I received a telephone call from Humana Press Senior Editor, Harvey Kane, inquiring whether there might be a need for a book to be published concerning the different aspects of computer forensics. During a subsequent meeting to discuss the current state of available texts covering this topic, I noted to Mr. Kane that there were...

XNA Game Studio 4.0 Programming: Developing for Windows Phone 7 and Xbox 360 (Developer's Library)
XNA Game Studio 4.0 Programming: Developing for Windows Phone 7 and Xbox 360 (Developer's Library)

Get Started Fast with XNA Game Studio 4.0–and Build Great Games for Both Windows® Phone 7 and Xbox 360®

 

This is the industry’s best reference and tutorial for all aspects of XNA Game Studio 4.0 programming on all supported platforms,...

Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

Algorithms (4th Edition)
Algorithms (4th Edition)

This book is intended to survey the most important computer algorithms in use today, and to teach fundamental techniques to the growing number of people in need of knowing them. It is intended for use as a textbook for a second course in computer science, after students have acquired basic programming skills and familiarity with computer...

The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1

The TITLE of Volume 4 is Combinatorial Algorithms, and when I proposed it I was strongly inclined to add a subtitle: The Kind of Programming I Like Best. Mv editors have decided to tone down such exuberance, but the fact remains that programs with a combinatorial flavor have always been my favorites.

On the other hand I've...

Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)
Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)

Data mining has developed rapidly and has become very popular in the past two decades, but actually has its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases. The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In corporate...

Carpenter's Complete Guide to the SAS Macro Language, 2nd Edition
Carpenter's Complete Guide to the SAS Macro Language, 2nd Edition

Art Carpenter thoroughly updates his successful first edition with an extensive collection of new examples and techniques. Addressing the composition and operation of the SAS macro facility and the SAS macro language, Carpenter's Complete Guide to the SAS Macro Language, Second Edition, is filled with ready-to-use macros, macro functions,...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy