Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing Domain-Specific Languages with Xtext and Xtend
Implementing Domain-Specific Languages with Xtext and Xtend

If you know Eclipse then learning how to implement a DSL using Xtext is a natural progression. And this guide makes it easy to get started through a step-by-step approach accompanied with simple examples.

Overview

  • Learn to quickly develop a domain-specific language with Xtext
  • Implement any...
Approximation Algorithms
Approximation Algorithms
Covering the basic techniques used in the latest research work, the author consolidates progress made so far, including some very recent and promising results, and conveys the beauty and excitement of work in the field. He gives clear, lucid explanations of key results and ideas, with intuitive proofs, and provides critical examples and numerous...
EJB 3.0 Database Persistence with Oracle Fusion Middleware 11g
EJB 3.0 Database Persistence with Oracle Fusion Middleware 11g

EJB (Enterprise JavaBeans) 3.0 is a commonly used database persistence technology in Java EE applications. EJB 3.0 has simplified the development of EJBs with an annotations-based API that eliminates the use of remote/local interfaces, home/local home interfaces, and deployment descriptors. A number of other books are available on EJB 3.0,...

Performance Management: Finding the Missing Pieces (to Close the Intelligence Gap) (SAS Institute Inc.)
Performance Management: Finding the Missing Pieces (to Close the Intelligence Gap) (SAS Institute Inc.)
Praise for Performance Management

" We are witnessing a convergence among advanced management concepts and practices. Performance management is a means to pull it all together, to understand the strengths and limitations of each management practice and leverage it for competitive advantage. Cokins’ book walks us through all this in...

Role-Based Access Control
Role-Based Access Control

Role-based access control (RBAC) is a technology that is attracting a great deal of attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. Under RBAC, security administration is greatly simplified by using roles,...

Learning Nagios 4
Learning Nagios 4

Learn how to set up Nagios 4 in order to monitor your systems efficiently About This Book Set up, configure, and manage Nagios 4 to secure and monitor your system Learn how to use libnagios and NERD to process and handle queries Packed with lots of tips, tricks and illustrations to explain the Nagios configuration and monitoring concepts in a...

Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

The definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco Adaptive Security Appliance

  • Delivers expert guidance from Cisco TAC engineers for securing small and medium business networks with the newly released Cisco all-in-one network security...

Scientific Data Analysis using Jython Scripting and Java (Advanced Information and Knowledge Processing)
Scientific Data Analysis using Jython Scripting and Java (Advanced Information and Knowledge Processing)

Over the course of the past twenty years I have learned many things relevant to this book while working in high-energy physics. As everyone in this field in the yearly to mid-90s, I was analyzing experimental data collected by particle colliders using the FORTRAN programming language. Then, gradually, I moved to C++ coding following...

2021 Microsoft Formulas and Functions: A Simplified Guide With Examples on how to take advantage of built-in Excel Formulas and Functions
2021 Microsoft Formulas and Functions: A Simplified Guide With Examples on how to take advantage of built-in Excel Formulas and Functions

You can master the use of over 101 Microsoft Excel Formulas and Functions if you make the decision to purchase this book. 

This guide is what should be called; a one-fit approach to understanding the basis of Excel formulas. This guide is useful especially for business owners, workers, and financial analysts who...

Developing Enterprise Java Applications with J2EE and UML
Developing Enterprise Java Applications with J2EE and UML

The Java 2 Platform Enterprise Edition (J2EE TM) offers great promise for dramatically improving the way that enterprise applications are built, and organizations that have adopted the J2EE are gaining a competitive advantage. The industry-standard Unified Modeling Language (UML) has helped countless organizations achieve software...

Schaum's Outline of Programming With C++
Schaum's Outline of Programming With C++
This Schaum's Outline presents all the fundamental concepts of the current ANSI standard version of the C++ programming language. This is an object-oriented extension of the very popular C language, and it promises to grow in popularity. Many complete programs are included.

Master programming with C++ with Schaum's--the
...
ServiceDesk Plus 8.x Essentials
ServiceDesk Plus 8.x Essentials

A kick-start guide to implement and administer IT Service Management processes with ServiceDesk Plus

Overview

  • Learn to quickly set up and effectively use day-to-day IT services
  • Understand the vital terminologies in a simplified manner
  • Learn to swiftly deal with issues and...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy