Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
LinkedIn For Dummies, 4th Edition
LinkedIn For Dummies, 4th Edition

Build your network, find a job, and been seen as a thought leader

LinkedIn is your number-one personal branding tool, and this friendly guide shows you how to harness it to build connections and relationships—and stand out in the world's largest professional network. LinkedIn For Dummies walks you step by...

Deploying IPv6 Networks
Deploying IPv6 Networks

An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.

  • Learn about IPv6 services and the relevant IPv6 features that make them possible

  • Plan, deploy, and manage IPv6 services at...

XPath 2.0 Programmer's Reference (Programmer to Programmer)
XPath 2.0 Programmer's Reference (Programmer to Programmer)
From its origins as a sublanguage of XSLT, XPath has come into its own as a key element of XML. XPath 2.0 has emerged as a robust language twice the size of its predecessor, complex and capable of standing on its own.

This substantive volume, by the editor of the W3C® XSLT 2.0 specification, is the authoritative reference on XPath 2.0. It...

Quality of Telephone-Based Spoken Dialogue Systems
Quality of Telephone-Based Spoken Dialogue Systems
An increasing number of telephone services are offered in a fully automatic way with the help of speech technology. The underlying systems, called spoken dialogue systems (SDSs), possess speech recognition, speech understanding, dialogue management, and speech generation capabilities, and enable a more-or-less natural spoken interaction with the...
Malware Detection (Advances in Information Security)
Malware Detection (Advances in Information Security)

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many...

Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture
Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture
Answers to your most pressing SOA development questions

How do we start with service modeling? How do we analyze services for better reusability? Who should be involved? How do we create the best architecture model for our organization? This must-read for all enterprise leaders gives you all the answers and tools needed to develop a sound...

Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
This book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it...
The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
Whether you’re shopping for clothes from your computer or mobile phone, or selling artworks around the globe, you face a dizzying array of choices and decisions. How do I pay? How do I get paid? What if something goes wrong?

The answer? PayPal.

We are—and will continue to be—the
...
Beginning Windows 8
Beginning Windows 8

Windows 8 has been described by Microsoft as its ‘boldest’ Windows release ever. Beginning Windows 8 takes you through the new features and helps you get more out of the familiar to reveal the possibilities for this amazing new operating system.

You will learn, with non-technical
...

Advanced Joomla!
Advanced Joomla!

Advanced Joomla! teaches you advanced techniques for customizing a Joomla! CMS, including creating templates, administration, and building extensions. It will provide the technical know-how and a bonanza of information that will allow you to take your Joomla! sites to the next level.

Written by bestselling
...

CEH: Certified Ethical Hacker Version 8 Study Guide
CEH: Certified Ethical Hacker Version 8 Study Guide

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide

Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that...

Reporting with Microsoft SQL Server 2012 (Professional Experience Distilled)
Reporting with Microsoft SQL Server 2012 (Professional Experience Distilled)

Learn to quickly create reports in SSRS and Power View as well as understand the best use of each reporting tool

Overview

  • Empowers a highly visual design experience
  • Increase productivity and proactive intelligence through operational or ad hoc reports
  • Reporting with Microsoft...
unlimited object storage image
Result Page: 397 396 395 394 393 392 391 390 389 388 387 386 385 384 383 382 381 380 379 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy